50/- `

Cover Story Technical Trends Can Quantum Computing Quantum Computing: Fusion of Provide Exponential Physics and Computers 26 Speedup? 13 ISSN 0970-647X | Volume No. 38 | Issue No. 11 | February 2015 11 | February 38 | Issue No. No. | Volume 0970-647X ISSN

Cover Story Research Front Quantum Information Frontiers of Research in Harnessing Processing with Quantum the Quantum World 29 Dots in a Cavity 16 Practitioner Workbench Security Corner A New Software Engineering 36 A Case Study of Niti Aayog of the State of Surashtra 41 www.csi-india.org www.csi-india.org CSI Communications | February 2015 | 1 CSI Elections 2015-2016/2017

As authorised by the Constitution section 5.7 and section 5.8, we present herewith the results of the elections conducted for the year 2015-2016/2017. The closing date for the receipt of the ballots was January 16, 2015. The results of the elections are given below: The following are declared elected: For the Term 2015-2016 (April 1, 2015 - March 31, 2016) For the Term 2015-2017 (April 1, 2015 - March 31, 2017) [1] Vice President cum President Elect (2015-16) CSI Chapters Elections Dr. Anirban Basu [1] Treasurer (Bangalore Chapter) (2015-17) [2] Nomination Committee ( 2015-16) Mr. Satish B G Prof. (Dr.) Anil K Saini [2] Management Committee (Bangalore Chapter) (2015-16) Mr. Rajeev Kumar Singh Dr. Prahlad Rao Prof. (Dr.) U K Singh Dr. Manju Nanda [3] Hon. Treasurer (2015-17) Dr. Arindam Sen Mr. R K Vyas Mr. Ravi K S [4] Regional Vice President (Region I - 2015-17) Mr. Mohan Ramanathan Mr. Shiv Kumar Dr. K Satyanarayan Reddy [5] Regional Vice President (Region Ill - 2015-17) Dr. C K B Nair Dr. Vipin Tyagi Mr. Anbunathan R [6] Regional Vice President (Region V - 2015-17) [3] Treasurer (Kolkata Chapter) (2015-17) Mr. Raju L Kanchibhotla Dr Ambar Dutta [7] Regional Vice President (Region Vll - 2015-17) [4] Management Committee (Kolkata Chapter) (2015-16) Mr. K Govinda Prof. Paramartha Dutta [8] Divisional Chair Person - Div. I (2015-17) Dr. Tanushyam Chattopadhyay Prof. M N Hoda Dr. Ajanta Das [9] Divisional Chair Person - Div. lll (2015-17) Ms. Sharmila Ghosh Mr. Ravikiran Mankikar Dr. Abhik Mukherjee [10] Divisional Chair Person - Div. V (2015-17) Prof. Subho Chaudhuri Mr. Suresh Chandra Satapathy Ms. Madhumita Sengupta Dr. Sanjoy Kumar Saha Nominations Committee 2014-2015

Mr. Sanjeev Kumar Chairman NC Prof. P Kalyanaraman Member NC Mr. Subimal Kundu Member NC

Following two amendments were also put to vote and the results are in favour, as detailed below, 1) Under CSI Constitution and Byelaws: a) Addition Under Section 4.3.3 ( b ) Finance Committee of CSI Constitution and Byelaws which reads as: v) in prescribing the manner of maintaining centralised accounts as required for consolidation on a monthly/annual basis for complying with statutory requirements. b) "Section 3.5 Student Branches" to be replaced by "section 3.5 Accredited Student Branches". All instances of "Student member" under Section 3.5 and its subsections to be replaced by "Student Volunteer". Favour - 94%, Against - 6% 2) Under CSI Chapter Byelaws: a) Section 4.2.6 of Chapter Byelaws which reads as follows: "The MC shall approve a Scheduled bank to deposit the funds received by the Chapter. It shall also designate the Offi cers (s) authorised to operate thereon." It shall read "The ExecCom shall approve a Scheduled bank to deposit the funds received by the Chapter. ExecCom shall also designate the Offi cers (s) authorised to operate thereon." b) "Section 3.1 of Chapter Byelaws "Student Branches" to be replaced by "Section 3.1 Accredited Student Branches" Favour - 93%, Against - 7% CSI 2015-16/17 Highlights/ Statistics Total eligible votes: 14,903 Total no. of votes casted: 3,696 Total % of voting: 24.80% Votes secured by individuals candidates can be viewed at http://www.csi-india.org/results-2014 and follow the link Please click here to see no. of ballots against each candidate. CSI Communications Contents

Volume No. 38 • Issue No. 11 • February 2015

Editorial Board Cover Story Research Front Quantum Information and Computation Frontiers of Research in Harnessing Chief Editor 7 Systems 29 the Quantum World Dr. R M Sonar Vishal Sahni and Dayal Pyari Srivastava Martin Laforest Editors Can Quantum Computing Provide Dr. Debasish Jana 13 Exponential Speedup? Practitioner Workbench Dr. Achuthsankar Nair David Keil Software Engineering.Tips() » 36 A New Software Engineering Resident Editor Quantum Information Processing with Ivar Jacobson and Ed Seidewitz Mrs. Jayshree Dhere 16 Quantum Dots in a Cavity Venu Gopal Achanta Security Corner Case Studies in IT Governance, IT Risk Technical Trends 41 and Information Security » Study of Quantum Computing with A Case Study of Niti Aayog of the 20 Signifi cance of Machine Learning State of Surashtra Published by Hardik A Gohel and Priyanka Sharma Dr. Vishnu Kanhere Executive Secretary Mr. Suchit Gogwekar Quantum Leap into High Performance For Computer Society of India 23 Computing Environment D G Jha, Kimaya Ambekar and Chinmay Palkar Design, Print and Dispatch by Quantum Computing: Fusion of Physics CyberMedia Services Limited 26 and Computers Tadrash Shah and Chintan M Bhatt

Please note: CSI Communications is published by Computer Society of India, a non-profi t organization. Views and opinions expressed in the CSI Communications are those of individual authors, contributors and advertisers and they may diff er from policies and offi cial statements of CSI. These should not be construed as legal or professional advice. The CSI, the publisher, the editors and the contributors are not responsible for any decisions taken by readers on the basis of these views and opinions. Although every care is being taken to ensure genuineness of the writings in this publication, PLUS CSI Communications does not attest to the originality of the respective authors’ content. Brain Teaser © 2012 CSI. All rights reserved. Dr. Debasish Jana 44 Instructors are permitted to photocopy isolated articles for non-commercial classroom use Happenings@ICT without fee. For any other copying, reprint or H R Mohan 45 republication, permission must be obtained in writing from the Society. Copying for other than personal use or internal reference, or of CSI Reports 46 articles or columns not owned by the Society without explicit permission of the Society or the CSI News 47 copyright owner is strictly prohibited.

Published by Suchit Gogwekar for Computer Society of India at Unit No. 3, 4th Floor, Samruddhi Venture Park, MIDC, Andheri (E), Mumbai-400 093. Tel. : 022-2926 1700 • Fax : 022-2830 2133 • Email : [email protected] Printed at GP Off set Pvt. Ltd., Mumbai 400 059.

CSI Communications | February 2015 | 3 Know Your CSI

Executive Committee (2013-14/15) »

President Vice-President Hon. Secretary Hon. Treasurer Mr. H R Mohan Prof. Bipin V Mehta Mr. Sanjay Mohapatra Mr. Ranga Rajagopal [email protected] [email protected] [email protected] [email protected] Immd. Past President Prof. S V Raghavan [email protected]

Nomination Committee (2014-2015) Prof. P. Kalyanaraman Mr. Sanjeev Kumar Mr. Subimal Kundu

Regional Vice-Presidents Region - I Region - II Region - III Region - IV Mr. R K Vyas Mr. Devaprasanna Sinha Prof. R P Soni Mr. Hari Shankar Mishra Delhi, Punjab, Haryana, Himachal Assam, Bihar, West Bengal, Gujarat, Madhya Pradesh, Jharkhand, Chattisgarh, Pradesh, Jammu & Kashmir, North Eastern States Rajasthan and other areas Orissa and other areas in Uttar Pradesh, Uttaranchal and and other areas in in Western India Central & South other areas in Northern India. East & North East India [email protected] Eastern India [email protected] [email protected] [email protected] Region - V Region - VI Region - VII Mr. Raju L kanchibhotla Dr. Shirish S Sane Mr. S P Soman Publication Committee (2014-15) Karnataka and Andhra Pradesh Maharashtra and Goa Tamil Nadu, Pondicherry, [email protected] [email protected] Andaman and Nicobar, Dr. S S Agrawal Chairman Kerala, Lakshadweep Prof. R K Shyamasundar Member [email protected] Prof. R M Sonar Member Dr. Debasish Jana Member Division Chairpersons Dr. Achuthsankar Nair Member Dr. Anirban Basu Member Division-I : Hardware (2013-15) Division-II : Software (2014-16) Division-III : Applications (2013-15) Prof. A K Saini Member Prof. M N Hoda Dr. R Nadarajan Dr. A K Nayak Prof. M N Hoda Member [email protected] [email protected] [email protected] Dr. R Nadarajan Member Division-IV : Communications Division-V : Education and Research Dr. A K Nayak Member (2014-16) (2013-15) Dr. Durgesh Kumar Mishra Member Dr. Durgesh Kumar Mishra Dr. Anirban Basu Mrs. Jayshree Dhere Member [email protected] [email protected] Important links on CSI website » About CSI http://www.csi-india.org/about-csi Membership Subscription Fees http://www.csi-india.org/fee-structure Structure and Orgnisation http://www.csi-india.org/web/guest/structureandorganisation Membership and Grades http://www.csi-india.org/web/guest/174 Executive Committee http://www.csi-india.org/executive-committee Institutional Membership http://www.csi-india.org/web/guest/institiutional- Nomination Committee http://www.csi-india.org/web/guest/nominations-committee membership Statutory Committees http://www.csi-india.org/web/guest/statutory-committees Become a member http://www.csi-india.org/web/guest/become-a-member Who's Who http://www.csi-india.org/web/guest/who-s-who Upgrading and Renewing Membership http://www.csi-india.org/web/guest/183 CSI Fellows http://www.csi-india.org/web/guest/csi-fellows Download Forms http://www.csi-india.org/web/guest/downloadforms National, Regional & State http://www.csi-india.org/web/guest/104 Membership Eligibility http://www.csi-india.org/web/guest/membership-eligibility Student Coordinators Code of Ethics http://www.csi-india.org/web/guest/code-of-ethics Collaborations http://www.csi-india.org/web/guest/collaborations From the President Desk http://www.csi-india.org/web/guest/president-s-desk Distinguished Speakers http://www.csi-india.org/distinguished-speakers CSI Communications (PDF Version) http://www.csi-india.org/web/guest/csi-communications Divisions http://www.csi-india.org/web/guest/divisions CSI Communications (HTML Version) http://www.csi-india.org/web/guest/csi-communications- Regions http://www.csi-india.org/web/guest/regions1 html-version Chapters http://www.csi-india.org/web/guest/chapters CSI Journal of Computing http://www.csi-india.org/web/guest/journal Policy Guidelines http://www.csi-india.org/web/guest/policy-guidelines CSI eNewsletter http://www.csi-india.org/web/guest/enewsletter Student Branches http://www.csi-india.org/web/guest/student-branches CSIC Chapters SBs News http://www.csi-india.org/csic-chapters-sbs-news Membership Services http://www.csi-india.org/web/guest/membership-service Education Directorate http://www.csi-india.org/web/education-directorate/home Upcoming Events http://www.csi-india.org/web/guest/upcoming-events National Students Coordinator http://www.csi-india.org/web/national-students- Publications http://www.csi-india.org/web/guest/publications coordinators/home Student's Corner http://www.csi-india.org/web/education-directorate/student-s-corner Awards and Honors http://www.csi-india.org/web/guest/251 CSI Awards http://www.csi-india.org/web/guest/csi-awards eGovernance Awards http://www.csi-india.org/web/guest/e-governanceawards CSI Certifi cation http://www.csi-india.org/web/guest/csi-certifi cation IT Excellence Awards http://www.csi-india.org/web/guest/csiitexcellenceawards Upcoming Webinars http://www.csi-india.org/web/guest/upcoming-webinars YITP Awards http://www.csi-india.org/web/guest/csiyitp-awards About Membership http://www.csi-india.org/web/guest/about-membership CSI Service Awards http://www.csi-india.org/web/guest/csi-service-awards Why Join CSI http://www.csi-india.org/why-join-csi Academic Excellence Awards http://www.csi-india.org/web/guest/academic-excellence- Membership Benefi ts http://www.csi-india.org/membership-benefi ts awards BABA Scheme http://www.csi-india.org/membership-schemes-baba-scheme Contact us http://www.csi-india.org/web/guest/contact-us Special Interest Groups http://www.csi-india.org/special-interest-groups Important Contact Details » For queries, correspondence regarding Membership, contact [email protected]

CSI Communications | February 2015 | 4 www.csi-india.org H R Mohan President’s Message From : President’s Desk:: [email protected] Subject : President's Message Date : 1st February 2015 Dear Members Let me, on behalf of CSI family, execom and my own self congratulate Dr. Vijay P Bhatkar for being awarded Padma Bhushan, the third highest civilian award. CSI along with the entire Scientifi c Community is proud of his contributions in high performance computing (including the development of Param, the Indian supercomputer), Indian language computing, education to home and integrative education and building institutions like CDAC, ER&DC and I2IT. CSI also congratulates Prof. Bimal K. Roy, Director of the Indian Statistical Institute and a well-known Statistician and Cryptologist who has been a supporter of CSI in many events for being awarded Padma Shri award. The Annual Students Convention (ASC) on the theme “Campus to Corporate and Beyond” was hosted by the Guru Nanak Institutions (GNI) at their campus on 3rd and 4th Jan 2015 was well attended with about 1000 student members of which over 450 cane from outside Hyderabad. Shri E.S.L Narasimhan, Governor of Andhra Pradesh & Telengana inaugurated the ASC and in his address highlighted the need for innovation, creativity and the changes in the current educational system to nurture the talents and use for the nation building. Prof. S.V. Raghavan, Past President of CSI and the CSI HISTORY. While physical items can be sent to CSI ED, material in Dr. S.S. Mantha, Former Chairman of AICTE delivered motivational talks. The electronic form may be sent to us by email at [email protected] ASC apart from panel discussions on topics such as “Campus to Corporate”, Our activity year is nearing end and we have just two more months “Career Opportunities”, “Entrepreneurship”, “Employment Opportunities in to go. While a number of CSI Chapters have celebrated and are planning Public Sector” and “Technology Enablement in Education” with panelists drawn to celebrate CSI@50 - the Golden Jubilee celebrations at their chapters from CSI family, industry and academia had several other technical events/ involving people who had contributed to the growth of CSI, I urge other competitions including paper presentations which benefi ted the participants chapters to take initiative to conduct CSI@50 event at their chapters and engaged them fully during the two days of the convention. On behalf of and also utilize the fi nancial support being extended from CSI HQ. While CSI, I congratulate and thank Dr. H.S. Saini, Managing Director of GNI, Fellow of doing so, I request all the divisions, chapters, student branches to CSI and the Convention Chair ably supported by the dedicated contributions of update their other events and activities carried out during the year in the Dr. D.D. Sarma, Fellow of CSI, Mr. Raju, RVP-5, Mr. Gautam Mohapatra, Chair of google form at http://goo.gl/nL1akS One can see the partially updated list at CSI Hyderabad and Mr. Chandrasekhar, RSC, the entire staff of GNI and a team http://goo.gl/IBQaK3 It may please be noted that the activities included in of CSI Hyderabad for the successful conduct of the ASC even though it had this list will be taken as a record for CSI awards to chapters and SBs and also to be postponed and run in a short lead time after the CSI-2014. Our sincere for compiling our annual report. thanks to the management of GNI for their direct involvement and extending In an endeavor to build a reference library at CSI ED, we have been full hearted support and hosting the convention in style providing all facilities requesting the various Organizational Units of CSI organizing the conferences including accommodation to outstation participants. It was heartening to note to provide a copy of the proceedings to CSI ED. While some have complied that a group of about 50 student members along with their staff came all the way from Kanyakumari, the tip of India to attend the ASC. with our request, we note that we are not receiving all the proceedings. It will I had the honour and privilege of inaugurating a new CSI Chapter be great if we can build this reference library which will be very useful to our at Mylavaram, an interior town near Vijayawanda in Andhra Pradesh. student members and members at large. In this context, I also request our Prof. P. Thrimurthy, CSI Fellow was instrumental in promoting this chapter. The members to donate books and other reference materials for adding in the effi cient follow-up of Mr. Y. Kathireasan, Senior Manager (Promotions) at CSI library at CSI ED. Their contributions will be suitably acknowledged. A partial ED and the initiative of Dr. E.V. Prasad, Prof. of CSE and Director at Lakireddy list of additions in the CSI ED may be seen at http://goo.gl/5aNCLD Bali Reddy College of Engineering and the support of the college management An update from the CSI ED. Conducted a two days BOSS MOOL facilitated the chapter formation in a record time. Mr. Raju, RVP-5 Mr. A.V. Workshop with the support of CDAC & IIT Madras at KPR College of Praveen Krishna, SB Counselor of CSI KL Univ. SB and Y. Kathiresan from CSI Engineering, Coimbatore; Organised the fi rst Research Symposium which ED joined me at the inauguration of the Chapter and highlighted about the CSI provided the platform for the young researchers to present and deliberate activities and how it can help professional, academic and student community. their fi ndings with the peer group and increase their confi dence level; The fi rst Management Committee of the Mylavaram chapter was formed with Participated in the MSME exhibition at Chennai and promoted the CSI Dr. Prasad as its fi rst and founding chairman who in his address highlighting activities among the small scale industries; Organising the fi rst Research the plans of the chapter informed that the membership will be increased to Conclave with the patronage of DeitY at CUSAT in Feb 2015 to propagate the over 100 within a year and also proposed to organize two to three conferences Visvesvaraya Ph.D. Assistance Scheme of the Government of India and help in this year itself. The chapter is the youngest one and has desire to grow. Let the academicians and the aspiring researchers to identify research areas and us support for its growth in all possible ways. to explore possibilities of support under the Scheme. I wish to inform the members that the CSI Nominations Committee Consistent with realizing the enhanced and ambitious vision of “IT for for the year 2014-15 had conducted the CSI elections for the period 2015- Masses”, CSI has launched an initiative that extends its services to schools 2016/2017 as per guidelines and announced the results in time. It is through Institutional Membership (IM) to schools. The IM scheme is aimed encouraging to note an increase in voting from 15.6% last year to 24.8%. at helping schools in computer education and use. As can be seen from the However, there had been some concerns from members during the election brochure at http://goo.gl/aXYd2S the IM provides signifi cant, long lasting period and after the announcement of results. These are being addressed. benefi ts of value to the school - its management, teachers and students. The As informed in my earlier message that in the Think Tank Meeting website at http://goo.gl/zEQTUk provides the details on how a school can held during the CSI-2014, our Fellows deliberated on the Past, Present and become an Institutional Member. We request our members to promote the Future of the CSI and shared their wish list. The compiled list is available IM in CSI among the schools. at: http://goo.gl/Uwx9II and it will be updated regularly while execom will I am sure that members would have noted the extension of the 15% discuss and prioritize the items to be taken up for implementation. Golden Jubilee discount to enroll as Life Members in CSI till March 2015. I would like to take this opportunity in renewing my request for your Please encourage your colleagues and contacts to avail this limited time off er contributions for the CSI HISTORY compilation. I am sorry to inform that the and become members and strengthen CSI. response to our request sent by email in multiple times during the last year Due to space constraints, let me close my message now and include and few inserts in CSI Communications has not been signifi cant. May I once few more interesting items in the next month. again request you to provide us whatever material you could share with us to compile the CSI HISTORY to present the same at least at the CSI-2015 With best regards to be held at Delhi in Oct 2015. Capturing information spread over about H.R. Mohan 50 years is a diffi cult task and without your help it is near impossible. I President earnestly request all of you to do the needful and help us in documenting Computer Society of India

CSI Communications | February 2015 | 5 Cover Vishal Sahni* and Dayal Pyari Srivastava** * Associate Chair of Excellence, Quantum Information and Consciousness and Coordinator, Quantum-Nano Systems Centre ** Assistant Professor (Research), Quantum-Nano Systems Centre and Department of Physics and Computer Science, Dayalbagh Story Educational Institute, Agra

“Gott wurfelt nicht!” (God does not play dice!) - Albert Einstein “God does not play dice. God plays bat and ball, fair and square.” - Revered Prof. P.S. Satsangi

This article presents the fundamental Center in Yorktown Heights, New York, a matter of creating algorithms that carry concepts in quantum computation and Paul A. Benioff of Argonne National out the right operations in the right order. information and some of the startling Laboratory in Illinois, David Deutsch of the Quantum information has arisen speedups obtained with quantum University of Oxford and the late Richard in response to a variety of converging algorithms. The future outlook of quantum P. Feynman - showed that particles scientifi c challenges. One goal is to computing is also presented along in superposed states can function as probe the foundations of the theory of with interesting ideas about quantum quantum bits, or qubits, and can undergo computation. What limits are imposed computing in microtubules in the brain. operations analogous to the NOT, OR and on computation by the fundamental laws AND operations of classical computing. of physics, and how can computational Introduction to Quantum Computing But that is not all. Quantum computers, power be enhanced by exploiting the Calculations like searching the Internet, if they can be built, could achieve results structure of these laws? Another goal is modeling the national economy, that would seem almost magical - and to extend the theory of communication. forecasting the weather, strain the quite diff erent from anything a classical What are the ultimate physical limits on capacities of even the fastest and most system has to off er. the performance of a communication powerful computers. The diffi culty is not channel, and how might quantum so much that microprocessors are too Quantum computers, if they can phenomena be harnessed by new slow; it is that computers are inherently be built, could achieve results that communication protocols? Yet another ineffi cient. The reason, in large part, is would seem almost magical and quite challenge is to understand and overcome that the logic built into microprocessors is diff erent from anything a classical the quantum eff ects that constrain how inherently serial. A truly parallel computer, system has to off er accurately we can monitor and manipulate in contrast, would have simultaneity built physical systems. What new strategies into its very nature. It would be able to In principle, for 500 particles, we can be devised to push back the frontier carry out many operations at once, to could create a quantum system that is a of quantum-limited measurements, or to search instantly through a long list of superposition of as many as 2500 states. control the behavior of intricate quantum possibilities and point out the one that Each state would be a single list of 500 systems? solves a problem. 1’s and 0’s. Any quantum operation What makes this quest Such computers do exist and are on that system-a particular pulse of intellectually compelling is that the called quantum computers - not so much radio waves, for instance, whose action results are so surprising. At first glance, because they are inherently small, but was, say, to execute a controlled-NOT quantum effects seem to compromise because they operate according to the operation on the 175th and 176th qubits- our efforts to store, transmit, and bizarre rules of , which would simultaneously operate on all 2500 process information, because quantum do indeed govern the world of the very states. Hence with one machine cycle, states are highly unstable and cannot small: the waves and particles of subatomic one tick of the computer clock, a quantum be observed without being disturbed. physics. One quantum rule in particular operation could compute not just on one Indeed, as the components of integrated creates an enormous incentive to apply machine state, as serial computers do, circuits continue to shrink toward the quantum mechanics to computing: the but on 2500 machine states at once! That atomic scale, quantum phenomena will startling discovery by twentieth-century number, which is approximately equal pose increasingly serious limitations that elementary particles such to a 1 followed by 150 zeros, is far larger on the performance of information as protons, neutrons and electrons can than the number of atoms in the known processing hardware, and one important persist in two or more states at once. That universe. Eventually, of course, observing task of quantum information science makes it possible, at least in principle, the system would cause it to collapse into will be to illuminate whether and how for them to be harnessed as processing a single quantum state corresponding to a such obstacles can be overcome. units in a machine more effi cient than single answer. a single list of 500 1’s and But the great surprise is that the any conventionally designed “classical” 0’s - but that answer would have been news about quantum effects is not computer could ever be. derived from the massive parallelism of all bad — far from it! The fragility of A Historical Note quantum computing. quantum information becomes a very In the 1970s and early 1980s physicists The consequence is that for some positive feature when it is recognized and computer scientists began to purposes quantum computers would be that eavesdropping on a quantum investigate how the properties of so much faster than classical computers communication channel necessarily quantum superpositions might be applied are that they could solve problems the leaves a detectable imprint, so that to computing. Early workers in the fi eld - classical computers cannot touch. If communicating with qubits provides including the physicists Charles H. Bennett functioning quantum computers can be better privacy than communicating with of the IBM Thomas J. Watson Research built, harnessing their potential will be just classical bits. Far more astonishing,

CSI Communications | February 2015 | 6 www.csi-india.org the intrinsic complexity of quantum formidable task. Our subject brings information ensures that quantum together what are arguably two of the systems of modest size are endowed greatest revolutions in twentieth-century with truly vast computational power, science, namely quantum mechanics and so that a quantum computer acting on information science (including computer just hundreds of qubits is capable in science). Figure 3 attempts to give a principle of performing tasks that could relationship between these two giants. never be performed by conventional The well-established theory of classical digital computers. information and computation is actually Moore’s Law Limits a subset of a much larger topic, the The question that arises is that how emerging theory of quantum information long can Moore’s law (Fig. 1) continue Fig. 2: Dopant impuriti es in Silicon and computation (Fig. 4). to hold since he formulated it in 1965. From Bits to Qubits (Quantum Bits) to What are the ultimate limits, if any, to Quantum Dits (Qdits) computing technology? How will the Boiled down to its essentials, any technology need to change in order to computer must meet two requirements: improve as much as possible? What will it must be able to store information happen to our civilization if the Moore as strings of 1’s and 0’s, or bits, and it Law will stop to work? While quantum must have a way of altering the bits computers will perform computations in accordance with instructions. A at the atomic scale, We might ask computer transforms its bits by means at this point how close conventional of gates, or devices designed to carry computations are to this scale already? out simple operations in logic. For Figure 2 shows Moore’s law in a different example, a NOT gate converts any way as the size of transistors reduces input bit into its opposite (0 becomes on silicon real-estate, i.e. the number l, and 1 becomes 0). An OR gate, by of dopant impurities in the bases of contrast, converts two input bits into bipolar transistors used for digital a single bit whose value is the higher logic against the year. This plot may be of the two (0 OR 0 yields 0; any other thought of as showing the number of combination gives 1). And an AND gate electrons required to store a single bit of Fig. 3: Relati onship between quantum yields a 1 only if both input bits are 1’s; information. An extrapolation of the plot mechanics and informati on theory otherwise, its output is a 0. Everything suggests that we might be within reach a computer does - whether synthesizing of the atomic-scale computations within from now? As we approach some of speech, calculating the billionth digit of a decade. This plot is perhaps even more the physical limits to conventional pi or beating Garry Kasparov at chess relevant for the development of quantum computational construction we may - ultimately comes about through the computation. Conventional computers begin to see a slow-down of this transformation of bits by gates. have been improving in speed and exponential rate. A detailed study of miniaturization at an exponential rate quantum computation may help us understand the fundamental physical Every electron acts as if it were a little since their earliest days. Clearly there magnet, spinning about an axis, whose is a bound to our ability to miniaturize limitations upon computation, conventional or otherwise. magnetic moment can point in only conventional electronics and we will one of two directions, up or down likely be touching that limit within the Providing a complete history of next ten to twenty years. The question ideas relevant to quantum computing is a is raised, can we continue to expect Could subatomic particles store to see an exponential improvement in bits? Could they form gates? Consider performance twenty and more years the electron. Every electron acts as if it were a little magnet, spinning about an axis, whose magnetic moment can point in only one of two directions, up or down. Thus the spin of the electron is quantized: it has just two possible states, which can readily be identifi ed with the 0’s and 1’s of an ordinary computer processor. And we can fl ip the bit - that is, change a down, Fig. 4: Relati onship between Quantum Informati on or 0, to an up, or l, by adding just a Fig. 1 : Moore’s Law and Classical Informati on smidgen of energy.

CSI Communications | February 2015 | 7 Suppose, however, we give it less Power of Quantum Computing – Some results from number theory to convert the energy than that - say, half a smidgen. Startling Quantum Algorithms and problem of factoring into one of estimating Once again, when we observe the Applications the periodicity of a long sequence. electron’s spin state, we will find that Quantum algorithms, however, are Periodicity is the number of elements the spin is quantized: it points either up another matter. In 1994 Shor discovered in the repeating unit of a sequence. The or down. But now there is an important, one that makes factoring almost as sequence 0, 3, 8, 5, 0, 3, 8, 5, . . ., for though subtle, difference. According effi cient as multiplication. A subtle instance, has a periodicity of four. To to the rules of quantum mechanics, approach has been devised for factoring estimate periodicity, a classical algorithm the probability of observing the spin in large numbers. Factoring is what computer must observe at least as many elements one or the other state will change. That scientists call a one-way problem: hard as there are in the period. Shor’s algorithm change arises from a qualitatively new in one direction but easy in the other. does much better. It sets up a quantum state, with no analogue in the ordinary, Suppose we ask the question, “Which two system made up of a large number of nonquantum, laws of physics, called a integers can be multiplied to obtain the superposed states. Each state is identifi ed super position of the two spin states: number 40,301?” Systematically testing with an element of the repeating sequence. a combined, in-between condition all the candidates might keep us busy for A single quantum mechanical operation that can be, say, 60 percent up and 40 fi fteen minutes or so. But if we are asked then transforms each superposed state percent down, or 22 percent up and 78 to multiply 191 by 211, it would take only in a way that depends on the value of the percent down. about twenty seconds with pencil and sequence to which the state corresponds. We can generalize quantum paper to determine that the answer is A series of such quantum mechanical information processing further to 40,301. The lopsided diffi culty of factoring operations, mathematically analogous quantum dits or qudits that are compared with multiplication forms to X-ray diff raction, is carried out on the d-level systems as an extension of the basis for practical data encryption superposed states. qubits that could speed up computing schemes such as the RSA protocol. Large tasks even further. A qubit is then prime numbers - say, a hundred digits A single quantum mechanical a special case of a qudit with each or so - make good “passwords” for operation then transforms each d = 2. In comparison to the qubit such systems because they are easy to superposed state in a way that system, d-dimensional quantum states verify: just multiply them together and see depends on the value of the sequence will be more efficient in quantum whether their product matches a number to which the state corresponds. A applications. With larger state space, that is already stored or that might even series of such quantum mechanical the qudit algorithms may improve be made publicly available. Extracting the operations, mathematically analogous channel capacity and quantum gates passwords from a 200-digit composite to X-ray diff raction, is carried out on the superposed states implementation, increase security and product of two large primes, however, explore quantum features. The qudit is equivalent to factoring the large systems have also been experimentally composite number - a problem that is Another startling result is Grover’ realized. The high-dimensional quantum very hard, indeed. The largest number that contribution to quantum computation system maybe provide different ordinary supercomputers have been able as an effi cient quantum mechanical quantum correlations and efficient to factor with non-quantum algorithms algorithm for searching unsorted data information processing. is “only” 140 digits long. Table 1 gives an bases. That algorithm, discovered in 1996, interesting comparison between classical is faster than any classical algorithm With larger state space, the qudit and quantum computers. can ever be. More than that, it has been algorithms may improve channel In computer science, one often tries shown that no other quantum mechanical capacity and quantum gates to solve hard problems by converting algorithm can ever beat it either., i.e. it is implementation, increase security and them into simpler problems that one optimal. explore quantum features already knows how to solve. In that spirit, Suppose we want to look up a phone Shor started by employing well-known number in a telephone directory that has

Algorithm Type Order Steps Execution Time on a Terahertz (THz) Computer

1/3 Best Classical Algorithm O(2n log(n)2/3) 1024 150,000 years (Classical THz computer)

Shor’s Quantum < 1 second O(n)3 1010 algorithm (Quantum THz computer)

Table 1: An interesti ng comparison between classical and quantum computers in factorizing a 300 digit number

CSI Communications | February 2015 | 8 www.csi-india.org Year Algorithm Speedup obtained

Demonstrates tasks quantum computers can perform in one shot that 1985 Deutsch’s algorithm classical takes two shots Demonstrates an exponential separation between classical deterministic 1992 Deutsch-Jozsa algorithm and quantum algorithms Demonstrates a superpolynomical separation between probabilistic and 1993 Bernstein-Vazirani algorithm quantum algorithms Demonstrates an exponential separation between probabilistic and 1994 Simon’s algorithm quantum algorithms

1994 Shor’s algorithm Demonstrates that quantum computers can effi ciently factor numbers

Demonstrates quantum search has polynomial speedup over classical 1996 Grover’s Algorithm search

Table 2: Some Quantum Algorithms with Startling Speedup

quantum superposition, the computation to us than previously considered - it A quantum computer could do much takes place on all states simultaneously. may be going on in billions of neurons better, thanks to its ability to carry out Table 2 illustrates some “quantum” type in our brain. Neurons in our brains are many operations at the same time algorithms giving a startling speedup over made up of microtubules. Penrose and classical algorithms. Hameroff (2011) describe microtubules a million entries. Suppose, too, that we This is just an insight into some of as self-assembling polymers of the have forgotten the person’s name; all the the startling applications of quantum peanut-shaped (4 nm x 8 nm x 5 nm) information to search with is an address. computing illustrating their immense protein dimer tubulin, each tubulin hetero In that case, our only recourse is trial and power and capability. Many more dimer molecule (110,000 atomic mass error. On average, we will read the names applications of quantum computing are units) being composed of an alpha and of 500,000 strangers before we fi nd discussed in detail in the later chapters. beta monomer, and is a polar molecule the one we want; on a very bad day, we Microtubules in the Brain as Quantum with its positive end near the δ-subunit. might have to look at 999,999 of them. A Information / Computation Processing Typically, thirteen linear tubulin chains computer could search much faster, but Devices (“protofi laments”) align side-to-side to algorithmically it would be in the same Quantum Computing may be much closer form hollow microtubule cylinders (25 boat: in general, a list of N items takes, on nm diameter) with two types of average, N/2 steps to search. hexagonal lattices A and B. The A quantum computer could do much hollow microtubule cylinders of better, thanks to its ability to carry out many about 25 nm in diameter range operations at the same time. Assuming from 200 nm to 25 micron in we had access to a quantum system, length. Structure of a microtubule here is how we could do the search: First and arrangement of its tubulins choose enough particles (some number q) is given in Figure 5. Since there so that there are enough quantum states are at least 32 states, i.e., 5 bits in the system (2q) to assign at least one (or 5/8 byte) of information per state to each name in the phone book. tubulin dumer molecule and 13 (To get a million names, for instance, we would need twenty particles, since 220 is dimers (of 8 nm length) per each slightly more than a million.) Place the ring of microtubule-cylinder information from the phone book into with 1250 rings per midsize quantum memory, and match each name (1-micron long) microtubule, the to a diff erent quantum state. Put the resulting information storage system into a superposition of the million capacity is approximately 10 or so states. Now the system can do a kilobytes per microtubule. Fig. 5: Structure of a Microtubule and the arrangement of computation that checks whether each Given 10,000 microtubules (or its tubulins of the names is the right name. Thanks to 100 million tubulin-dimers)

CSI Communications | February 2015 | 9 per neuron, it represents 100 megabytes correction, first proposed in 1995 and of processing power per neuron which The fi eld of quantum information continually developed since, small scale translates into a total information storage processing has made numerous quantum computers have been built promising advancements since its and the prospects of large quantum capacity of human brain (with 100 billion conception, including the building neurons) of 10 exabytes (i.e. of the computers are looking up. Probably 18 of two- and three-qubit quantum order of at least 1 exabyte = 10 bytes). computers capable of some simple the most important idea in this field According to Penrose-Hameroff Orch. arithmetic and data sorting is the application of error correction OR (Orchestrated Objective Reduction) in phase coherence as a means to theory, each tubulin molecule can exist extract information and reduce error scientists and researchers in the fields as quantum superposition (i.e. quantum in a quantum system without actually of Quantum and Nano Computing like bit or qubit) of both states (black and measuring that system. Dr. Charles Bennett, Dr. Lov Grover, Prof. white) coupled to London force dipole At this point, only a few of the benefi ts Stuart Hameroff, Prof. Vlatko Vedral, in hydrophobic pocket. Furthermore the of quantum computation and quantum Prof. Gilles Brassard, Prof. Richard A-lattice has multiple winding patterns computers are readily obvious, but before Jozsa, Prof. Lajos Diosi, Prof. Artur which intersect on protofi laments at more possibilities are uncovered theory Ekert, Prof. Leonard Mlodinow, Sir specifi c intervals matching the Fibonacci must be put to the test. In order to do this, Roger Penrose, Prof. Stuart Hameroff, series found widely in nature and devices capable of quantum computation Prof. Mani Lal Bhaumik and Nobel possessing a helical symmetry enabling must be constructed. Quantum computing Laureates Prof. Douglas Osheroff and topological quantum computing. hardware is, however, still in its infancy. As Prof. Robert Richardson (Physics, 1996) (Satsangi, 2011). a result of several signifi cant experiments, among others. You can refer to ‘http:// Penrose and Hameroff (2011) nuclear magnetic resonance (NMR) has www.dei.ac.in/dei/quantumNano/’ for estimate approximately 108 tubulins in become the most popular component in further details. each neuron which switch and oscillate quantum hardware architecture. Groups in the range of 107 per second. This gives Obstacles and Research from Los Alamos National Laboratory and an information capacity as the single- The field of quantum information MIT constructed the fi rst experimental cell value at the microtubule level of 1015 processing has made numerous demonstrations of a quantum computer operations per second per neuron. The promising advancements since its using nuclear magnetic resonance total brain capacity (1011 neurons, 103 conception, including the building of two- (NMR) technology. Currently, research is synapses per neuron, 102 transmissions and three-qubit quantum computers underway to discover methods for battling per synapse per second) would thus capable of some simple arithmetic and the destructive eff ects of decoherence, to potentially translate at the microtubule data sorting. However, a few potentially develop an optimal hardware architecture level as 1026 operations per second in large obstacles still remain that prevent for designing and building a quantum comparison to the earlier estimates us from “just building one,” or more computer, and to further uncover quantum of AI community for the information precisely, building a quantum computer algorithms to utilize the immense processing capacity of the entire brain of that can rival today’s modern digital computing power available in these 1016operations per second at the level of computer. Among these difficulties, devices. Naturally this pursuit is intimately neurons, synapses and their transmission- error correction, decoherence, and related to quantum error correction codes rate per second. (Srivastava, 2013). hardware architecture are probably the and quantum algorithms, so a number of most formidable. Error correction is groups are doing simultaneous research Quantum Computing in India rather self explanatory, but what errors in a number of these fi elds. To date, Th e annual event of the quantum need correction? The answer is primarily designs have involved ion traps, cavity computing community in India is those errors that arise as a direct result quantum electrodynamics (QED), and International School on Quantum of decoherence, or the tendency of a NMR. Though these devices have had and Nano Computing Systems and quantum computer to decay from a mild success in performing interesting Applications (QANSAS) organized given quantum state into an incoherent experiments, the technologies each have annually under aegis of MHRD National state as it interacts, or entangles, with serious limitations. Ion trap computers Mission on Education through ICT the state of the environment. These are limited in speed by the vibration (NMEICT) at Dayalbagh Educational interactions between the environment frequency of the modes in the trap. NMR Institute since 2008 in end-November and qubits are unavoidable, and induce devices have an exponential attenuation of in collaboration with leading research the breakdown of information stored in signal to noise as the number of qubits in centres from all over the world especially the quantum computer, and thus errors Institute for Quantum Computing, in computation. Before any quantum University of Waterloo. Some of the computer will be capable of solving In principle, a large scale quantum prominent Indian partners in the effort hard problems, research must devise computer can be built using a are at IIT Kanpur, IIT Kharagpur, IIT a way to maintain decoherence and controllable quantum system, Delhi, IISc Bangalore, IMSc Chennai other potential sources of error at an provided the physical system meets the following requirements, called as and TIFR Mumbai. The Schools acceptable level. Thanks to the theory the DiVincenzo criteria have attracted leading international (and now reality) of quantum error

CSI Communications | February 2015 | 10 www.csi-india.org a system increases. Cavity QED is slightly Information Processing Consciousness in the Universe: more promising; however, it still has only • Engineering and control of quantum Neuroscience, Quantum Space-Time been demonstrated with a few qubits. All- mechanical systems far beyond Geometry and Orch OR Theory, silicon quantum computers are also in the anything achieved so far, in particular Journal of Cosmology, Vol. 14, April- vogue nowadays. concerning reliability, fault tolerance May 2011. In principle, a large scale quantum and using error correction. [2] Sahni V (2007a), Quantum computer can be built using a controllable • Development of a computer Computing, ISBN 978-007062095-7, quantum system, provided the physical architecture taking into account Tata McGraw Hill, New Delhi, 2007. system meets the following requirements, quantum mechanical features. [3] Sahni V, Lakshminarayanan V, called as the DiVincenzo criteria (Di • Development of interfacing and Srivastava D P (2011), Quantum Vincenzo, 2000) : networking techniques for quantum Information Systems, ISBN 1 A scalable physical system with computers. 9780070707078, Tata McGraw Hill, well-characterized qubits. • Investigation and development of New Delhi, April 2011. 2 The ability to initialize the state quantum algorithms and protocols. [4] Satsangi, P S (2011), “Cosmology of of the qubits to a simple fi ducial • Transfer of academic knowledge Consciousness : Towards Quantum- state. about the control and measurement Theoretic Systems Modelling; Spirit- 3 Long (relative) decoherence of quantum systems to industry and Mind-Brain Interactions” Vision Talk times, much longer than the thus, acquisition of industrial support at Inaugural Workshop of Centre for gate-operation time. and interest for developing and 4 A universal set of quantum Consciousness Studies (CONCENT providing quantum systems. 2011), Dayalbagh Educational gates. In conclusion, the future of quantum 5 A qubit-specifi c measurement Institute, Dayalbagh, Agra, October 1, computer hardware architecture is likely to 2011. capability. be very diff erent from what we know today; [5] Srivastava D P (2013), “Graph 6 The ability to interconvert however, the current research has helped Theoretic Quantum Field / System stationary and fl ying qubits. to provide insight as to what obstacles the Modelling for Quantum Information 7 The ability to faithfully transmit future will hold for these devices. fl ying qubits between specifi ed / Computation Circuits and locations. Acknowledgements Algorithms”, Ph.D. Thesis, Dayalbagh The general problems to be solved The authors are extremely grateful to Educational Institute, Dayalbagh, for physical realization of Quantum Revered Prof. P S Satsangi, Chairman, Agra. Information Processing or Quantum Advisory Committee on Education, [6] DiVincenzo D P, “The Physical Computation are in particular : Dayalbagh Educational Institutions for Implementation of Quantum • Identifi cation of the best suitable introduction to the fi eld and paternal Computation,” Fortschritte der physical system which allows guidance and encouragement. Physik 48, pp. 771-784 (2000); for scalability, coherence and References quant-ph/0002077. fast implementation of Quantum [1] Penrose and Hameroff (2011), n

Dr. Vishal Sahni is Associate Chair Professor of Excellence in Quantum Information and Consciousness and Coordinator of the Quantum-Nano Systems Centre, Research and Technology Park at Dayalbagh Educational Institute (Deemed University), Dayalbagh, Agra. He obtained his Bachelor’s degree in Electrical Engineering in 1999, M.Tech. in Engineering Systems in 2001 and Ph.D. in Evolvable Hardware Systems in 2004, all from Dayalbagh Educational Institute. He has been a Visiting Scientist at Institute for Quantum Computing, University of Waterloo in 2009. He has started an Annual International School on Quantum and Nano Computing Systems and Applications (QANSAS) at Dayalbagh Educational Institute with participation of over 200 scientists and researchers from all parts of the globe. He is closely involved with the Systems Society of India, an umbrella body of systems professionals from all knowledge domains. He has authored a book on “Quantum Computing” and co-authored books on “Quantum Information Systems” and “Nano Computing”.

Dr. Dayal Pyari Srivastava obtained her Bachelor’s degree in Physics, Masters’ degrees (M.Sc. and M.Phil.) in Electronics and Ph.D. in Computer Science from Dayalbagh Educational Institute under collaboration with IIT Delhi under their MoU. She is Assistant Professor (Research) at Quantum-Nano Systems Centre and Department of Physics and Computer Science, Dayalbagh Educational Institute. She is an avid researcher and has been actively involved in physics education for over 20 years. Her research interests include quantum teleportation, quantum dots, quantum entropy and nanoscale quantum systems. She has won several awards and honours and is closely involved in promoting systemic activities in the country. She has authored several invited papers and reviews in referred journals of national and international repute. She has also authored a book on “Quantum Information

About the Authors Systems” published by McGraw Hill.

CSI Communications | February 2015 | 11 Cover David Keil Story Assistant Professor, Computer Science Department, Framingham State University, Framingham, Massachusetts, USA

Some New Developments Southern California, University of A recent development in quantum California Santa Barbara, Google, and . . . a possible quantum-computing computing is the assembling of a team Microsoft, defi ned quantum speedup, challenge to the principle, known as of twenty researchers by Google to build S(n), for a problem with input of size n, the quantitative Church’s Thesis, that any physical computing device can quantum computing devices. University as C(n) / Q(n), where C(n) is the time be simulated by a Turing machine in a of California Santa Barbara John required by a classical device and Q(n) is number of steps that is polynomial in the Martinis will lead the team. Work will be the time required by a quantum one. resources used by the computing device based in part on previous research with The D-Wave machine is not a machines built by D-Wave, a Canadian universal programmable computer, like company. D-Wave claimed to have classical devices, but rather what is called according to Alan Turing and Alonzo created “the world’s fi rst commercially a quantum annealer. It solves certain Church, can simulate any algorithmic available quantum computer” in 2011. problems by having a two-dimensional computation. Turing and Church were Quantum computing has been a array of qubits interact to reach a “ground logicians working in the 1930s. theoretical and even speculative fi eld. state.” Annealing, a metaphor for which Shor wrote, however, that “quantum It is based on the notion of qubits is used in some artifi cial-intelligence computers will likely not become widely (pronounced “Q-bits”), whose values algorithms, is a physical process of useful unless they can solve NP-complete may be 0, 1, or a probability distribution “cooling down” or lowering energy level or problems.... There are some weak over that set. Qubits are fragile in that tiny disorder in a system. indications that quantum computers perturbations in a system may destroy are not powerful enough to solve NP- A Fast Quantum Algorithm for Factoring them. Researchers have been able to complete problems”[14]. Moreover, of claims for the performance extend their lives from nanoseconds, only practical application of the quantum of particular machines, an effi cient decades ago, to minutes, today. Martinis algorithm described by Shor appears to be quantum-computing algorithm for fi nding reports a 10,000-fold rise in the lifetimes in breaking public-key cryptography. the factors of large integers has been of qubits that can be regularly maintained, published and studied since the mid- Satisfi ability and Other Hard Problems up to 50 to 100 microseconds. [14] The progress of quantum computing 1990s . Peter Shor’s algorithm executes Many practical problems faced and solved to recognition by signifi cant forces in time that is a polynomial function of by life forms require exponentially large in industry and academia is striking. the size of the input, but is not guaranteed amounts of time to solve perfectly. These Twenty years ago, an expert noted always to provide the correct answer include planning, because threats and that capabilities “permit only the most to the factoring problem. However, the opportunities explode exponentially as we rudimentary implementations of quantum answer it provides may be easily checked look father into the future to weigh them. [7] computing”[7]. Has this changed? in polynomial time . No known algorithm They also include resolving ambiguities for classical computer architectures in communication, since alternative factors numbers in polynomial time. possibilities also explode with the length The progress of quantum computing Hence Shor’s algorithm provides of utterances. A large set of such problems to recognition by signifi cant forces in exponential speedup for this task. But we exists, called NP-complete (NPC), none industry and academia is striking fi nd no indication that it has been used on of which has a known polynomial-time a D-Wave or other quantum device. solution but all of which would have such The prospect that quantum Also in 2014, a test of the $10 solutions if any one of them did. We don’t computing might enable exponential solve them exactly; rather we obtain million D-Wave computer, posted online speedup was explored by David Deutsch at Science magazine in June, produced in the 1980s[6]. Research in the 1990s satisfactory approximate solutions. results that some researchers described identifi ed problems that quantum Let us consider a case where the as not supporting claims of exponential computers can theoretically solve exponential speed-up, claimed by some [3, 14] speedup . The machine used from 8 to quickly and exactly, that classical devices for quantum computing, would open 512 qubits. The summer 2014 testing was cannot. It induced discussion about a up entirely new practical computing done by a team that included Martinis, possible quantum-computing challenge horizons, if it were applicable to general- as well as Matthias Troyer of the Swiss to the principle, known as the quantitative purpose computing. A classical NPC Federal Institute in Zurich. The co-founder Church’s Thesis, that any physical problem is the satisfi ability problem (SAT) of D-Wave has been quoted disparaging computing device can be simulated by a in propositional logic. the test in a communication to Wired Turing machine in a number of steps that We may approach satisfi ability magazine. is polynomial in the resources used by the by starting with the easier problem of The test team, which included computing device. The Turing machine is evaluation of logic formulas. Suppose researchers from the University of an imaginary mathematical device that, we are off ered a formula, such as (p∨q)

CSI Communications | February 2015 | 12 www.csi-india.org ∧ (¬p∨r) ∧¬r, and a set of assigned truth be verified efficiently on a quantum properties of wave/particles and values of the variables p, q, and r, such as computer, given a possible solution, discovered the discreteness of behavior at (T, F, T); that is, p = true, q = false, and analogous to the problem set NP in the particle level. Whereas we think of the r = true. Then what is the value of the classical computing. size of a planetary orbit as a quantity along formula? It turns out to be false, as we On the other hand, a 2010 paper by a continuum, for example, the possible can determine with a truth table or by researchers at Princeton and the Max orbits of an electron around the nucleus substituting the values true and false for Planck Institute indicates pessimistic of an atom are limited to certain discrete the variable names and performing the prospects for quantum solutions to quantities. specifi ed operations. This is the evaluation the SAT problem[12]. For problems like In a quantum computer, symbols problem in propositional logic. It’s easy satisfi ability or other NP-complete can be either 0, 1, or a superposition of to solve quickly, in time proportional to problems, “the quantum benefi ts appear probabilities of 0 and 1 at the same time. the number of variables or the size of the to be inherently more restricted” than for The superposed state collapses when it formula. factoring. is measured. Entanglement in quantum A diff erent problem, about formulas theory is the case where two particles Quantum Theory and Computing alone, is to tell whether some set of may even at a distance have states that Classical computing, with variable assignments exists that makes depend on each other. These are weird- microprocessors, bits, and random- the formula true. One way to solve this is sounding and counterintuitive notions for access memory, could not have become to write a truth table and see if any row people who work in fi elds like classical practical without quantum theory, which has a rightmost value true. For the formula computing. made possible the invention of the (p∨q) ∧ (¬p∨r) ∧¬r, the truth table is as Quantum theory has from the transistor[3]. The transistor replaced the follows: beginning challenged common-sense slow, unreliable relay and vacuum tube intuition. A century ago (1913), Niels p q r p∨q ¬p∨r ¬r (p∨q) ∧ (¬p∨r) ∧¬r Bohr published a description of atoms as electron particles orbiting clusters of other 0 0 0 0 1 1 0 particles. Unlike planetary orbits in the 0 0 1 0 1 0 0 solar system, electron orbits are discretely 0 1 0 1 1 1 1 constrained, and changes in orbit are 0 1 1 1 1 0 0 accompanied by emission or absorption of 1 0 0 1 0 1 0 energy. We might notice that in this sense, 1 0 1 1 1 0 0 atoms have a digital character that solar 1 1 0 1 0 1 0 systems lack at the macro scale. 1 1 1 1 1 0 0 . . . atoms have a digital character that The formula is satisfi able because it solar systems lack at the macro scale evaluates to true in at least one case: the For problems like satisfi ability or other third row of the truth table (F, T, F). Unlike NP-complete problems, “the quantum Quantum State, Gates, and Registers the evaluation problem in propositional benefi ts appear to be inherently more restricted” than for factoring Researchers in quantum computing have logic, the satisfi ability problem is believed described notions of quantum state, to be very time consuming. This is because analogous to the state of a computation the size of a truth table with n variables is as a switch that switches another switch. on a classical machine, and quantum 2n, and no faster method of solving SAT Likewise, lasers, essential for devices such gates, analogous to logic gates in classical in the general case is known, other than as DVDs, are generated by the quantum computing. On an ordinary computer, checking every row of such a truth table. eff ect of excitation of electrons. state is the set of values of all bits in the If n is 200, then the truth table will fi ll the Quantum mechanics is a development machine, or equivalently, the values of universe. in theoretical physics that occurred in all variables in a computation. The state A 2006 paper by S. Bravyi describes the twentieth century. It supplemented of a quantum computer is described by a a quantum algorithm for quantum 2-SAT, at the subatomic level the dynamics that vector that is a linear superposition of all a version of the satisfiability problem Newtonian and Einsteinian physics had bits in the vector. that replaces propositional-logic explained at the level of large bodies State transitions are described by a formulas with two variables by 2-qubit and waves in motion. Whereas Newton unary operator on the vector space[1]. A states, and replaces the assertion that explained that forces accelerate large 3-qubit register, for example, may have a set of variable assignments satisfies bodies, Einstein’s theory of relativity the state |010〉, also written |2〉, also a formula with the quantum n-qubit explained that this acceleration has a written (0, 0, 1, 0, 0, 0, 0, 0), where the 1 state[2]. Bravyi describes BQP, the set of limit – the speed of light – and that matter is the probability that the register has the problems that a quantum computer can and energy, space and time, particles and value 2 and the 0s are the probabilities solve in polynomial time with a bounded waves may be seen accurately as pairs that is has the values 0, 1, or 3 to 7. probability of error. Similarly, QMA is a that are one. All the allowed operations on qubit set of problems whose solutions may Quantum theory addressed the registers are rotations. Since rotations

CSI Communications | February 2015 | 13 may be done forward or backward, all to x. If we consider where we could be quantum computing, it will not break quantum computations are reversible. after taking some plane on one flight the performance-to-resources barrier Hence only reversible classical algorithms from city x, then the set y would contain established tentatively by complexity may be executed on quantum machines. all the possibilities. If we imagine theorists forty years ago. [14] boarding a random plane, the one city This is not an insurmountable obstacle . Is Quantum Computing Better Adapted where we will land is constrained but Quantum unary transformations and to Fuzzy Problems? could be considered nondeterministic. quantum XOR gates enable the building of Whereas the formal descriptions of Nondeterministic automata (simple circuits of arbitrary complexity in quantum the hard problems encountered by [7]. Multiple computational abstract mathematical machines) are computers humans and all other life forms are pathways may, by superposition, evolve of great theoretical value in computer discrete, and these problems (called in parallel. For example, a 1000-qubit science. NP-complete) give evidence of being register may take all 21000 pathways. State On the other hand, to compute intractable and not worth solving is indeterminate in a quantum computer such a set y of one-stop destination precisely, these life forms nevertheless at any intermediate stage, but may be cities would require a representation of survive by finding satisfactory defi nite, hence useful, at the completion y, a representation of sets. Such digital approximate and probabilistic solutions. of a computation. representations exist, and they are (In fact, since these problems are in Errors and decoherence (collapse of by no means random, nor probability continuous physical space and time, superposed states) are two concerns of distributions. they are in that form unsolvable by any implementers of quantum computing. Thus quantum computing digital computer, anyway[6].) challenges those of us who are trained Errors grow exponentially as the quantity Some researchers have noted that in computer science to stretch our of qubits in a system rises. Interaction of these fuzzy problems are well suited imaginations and our notions of what the extremely sensitive quantum systems to quantum computing[13]. A sequence computing is. In the same way, quantum with their environments may destroy of fuzzy numbers may correspond to theory challenged physicists trained qubits. our uncertainty about the inputs to a in the Newtonian assumptions about Copying qubits is not possible, computation. A fuzzy number x is a physics and in the much more recent because their quantum state is destroyed generalization of a real number, in that it is theory of relativity. in the copying. Almost all digital a set of values v that may be x, each with an computing operations involve copying. Fundamental Obstacles to Some extent to which it is x. Thus it is similar to a But theorists have worked on detection Speedup Prospects? fuzzy set, such as Tall, the set of all possibly schemes that involve comparing rather Possibly a fi nal negative answer to the tall people together with the degrees to than copying qubits. question posed by this article is a result which each person is deemed tall. reported in 2003[10]. According to a Two ideas of these researchers for Copying qubits is not possible, because theorem by Jozsa and Linden, the quantum quantum algorithms that speed up fuzzy their quantum state is destroyed in the entanglement of multiple elements, with a computing are as follows: copying number unbounded with respect to input 1. Since fuzzy numbers may be size, is needed for exponential speedup. represented as classes of real Determinism: A Foundation of Computer Shor’s algorithm, for example, entails intervals, fast quantum interval Science entanglement of an unbounded number of algorithms may solve problems The notions that observable entities, such particles. A widely respected 2008 paper involving fuzzy numbers. (Whereas as particles, are in indeterminate, undefi ned, affi rms this result in passing[5]. classically computing the range of or probabilistic states seems to collide with Thus, the cost of exponential an interval is NP-hard, quantum the necessary foundations of computer speedup may be exponential quantum algorithms off er tractable solutions.) science. This discipline is concerned with processing hardware. This is similar 2. Computing a function on a sequence the execution of algorithms and algorithm- to the requirement, for some parallel of fuzzy numbers on a quantum based interactive processes in the real computation, that an exponential number computer may reduce the classical world. Algorithms compute mathematical of processors be available in order running time to its square root for functions on representations of parts to provide exponential speedup. The the most time-consuming step, of the real world. A function on natural superposition of 21000 states and path- which is the minimum of all possible numbers or strings of symbols is, by ways may be physically possible under combinations of inputs. defi nition, a mapping from one discrete quantum theory. The entanglement of value x to another, y, such that for any x a 21000 particles, more than can exist in the . . . the work on quantum algorithms unique y exists. Here x is called input and universe, is not. If the result by Jozsa and for fuzzy computing may point the way y is output. Linden holds, then despite the power of toward fruitful avenues of research In computer science, a notion of leading to practical contributions nondeterminism exists; namely, that Thus the cost of exponential speedup for a given x, y may be a set. Thus we may be exponentially large quantum Readers of this article may wish to could make x a city and y the set of processing hardware consider looking into these optimistic cities with direct airline connections claims. Though a speedup of √n is not

CSI Communications | February 2015 | 14 www.csi-india.org exponential, or even linear, the work on [6] David Deutsch. Quantum theory, the of the Royal Society of London. Series A: quantum algorithms for fuzzy computing Church-Turing principle and the universal Mathematical, Physical and Engineering may point the way toward fruitful quantum computer. Proceedings of the Sciences 459.2036 (2003): 2011-2032. Royal Society of London. A. Mathematical [12] Christopher R Laumann et al. On product, avenues of research leading to practical and Physical Sciences, 400:1818 (1985), pp. generic and random generic quantum contributions. 97-117. satisfi ability. Phys. Rev. A 81:6 (2010). [7] DiVincenzo, David P. Quantum [13] Mark Martinez, Luc Longp re, Vladik References computation. Science 270:5234 (1995): Kreinovich, Scott A Starks, and Hung T [1] Adriano Barenco et al. Elementary gates 255-261. Nguyen. Fast quantum algorithms for for quantum computation. Physical Review [8] Richard P Feynman. Simulating physics handling probabilistic, interval, and fuzzy A 52:5 (1995): 3457. with computers. International Journal of uncertainty. Department of Computer [2] Sergey Bravyi. Effi cient algorithm for a Theoretical Physics 21:6/7 (1982), pp. 467- Science Technical Report UTEP-CS-03-16, quantum analogue of 2-SAT. No. quant- 488. University of Texas El Paso, 5/1/2003. ph/0602108. Feb, 2006. [9] Elizabeth Gibney. Quest for Quantum [14] Peter W Shor. Polynomial-time algorithms [3] Adrian Cho. Quantum or not, controversial Computers Heats Up. Scientifi c American, for prime factorization and discrete computer yields no speedup. Science Dec. 4, 2014. logarithms on a quantum computer. SIAM 344:6190 (June 20, 2014), pp. 1330-1331. [10] Jeremy Hsu. Google hires quantum Journal on computing 26:5 (1997): 1484- [4] Brian Cox and . The Quantum computing expert John Martinis to build 1509. Universe. Da Capo Press, 2011. new hardware. IEEE Spectrum, Sept. 8, [15] Troels F Ronnow, Matthais Troyer, et al. [5] Animesh Datta, Anil Shaji, and Carlton M 2014. Defi ning and detecting quantum speedup. Caves. Quantum Discord and the Power [11] Richard Jozsa and Noah Linden. On Science 345:6195 (July 25, 2014), pp. 420- of One Qubit. Phys. Rev. Lett. 100, 050502 the role of entanglement in quantum- 424. n (2008). computational speed-up. Proceedings

Prof. David M Keil has taught at Framingham State University, USA, since 1997. He has acted as Director of Assessment for computer science since 2009. Additional responsibilities include as Search Committee chair in Spring 2001 and member of search committee in 2004 and 2013-2014. He was Acting chair in Spring 2000-Fall 2000 and 2003-2004 and Faculty coordinator for computer-science lab during 1997-1998. He has presented at workshops on theory and practice of open computational systems, evolutionary computation, environments for multi-agent systems, foundations of interactive computing, and teaching and assessment in computer science. His research interests include

About the Author interactive models of computation, evolutionary computation, artifi cial intelligence, database theory and Kolmogorov complexity.

CSI Communications | February 2015 | 15 Cover Venu Gopal Achanta Story Associate Professor, Department of Condensed Matter Physics and Materials Science TIFR, Homi Bhabha Road, Mumbai

Introduction Hadamard gate prepares the input state Communication and computing are A quantum computer is envisaged in a superposition state, a Controlled the heart of information processing for diff erent applications like Shor’s NOT gate (cNOT) whose second input is whether classical or quantum. Photonics algorithm for factoring large numbers negated only when the fi rst input is true, and eventually to study quantum a Toff oli gate which copies the fi rst two dominates the development of modern mechanical systems that are useful for day classical communication based on futuristic applications in diverse fi elds inputs to the fi rst two outputs and the transfer of light over free space or fi bers. third output is the Exclusive Or of the third Quantum communication or quantum input and the AND of the fi rst two inputs On the other hand, as is well known, key distribution is also demonstrated and and the Fredkin gate which swaps the last computing in the classical domain is still in fact commercial systems are available two inputs if the fi rst input is 0. Some of ruled by Silicon technologies and the the quantum logic gates are described now from diff erent companies like Moore’s law governs the growth of the idquantique, magiqtech, smartquantum in Fig.1. To explain the complexity in fi eld. Shrinking transistor sizes, possibly, realizing the quantum logic gates with and quintessencelabs. Crucial single approaching the single molecule size limits photon sources are mostly based on very existing technologies, a schematic of the the future and this lead to the search for quantum phase gate which was proposed weak light sources. Deterministic single alternate technologies. There are several photon sources, that is, sources that emit in 1995 by Kimble’s group is shown in alternatives being pursued to overcome [5] single photons at precise times are still the bottom row of Fig.1 . A cNot gate the limitations set by shrinking sizes has been demonstrated in diff erent not very effi cient. Some of the possibilities including alternate designs being pursued that are demonstrated are based on single systems including in trapped ions and at University of Illinois (SONIC), and linear optics based integrated circuits. quantum dots[1], nitrogen vacancies in optical, DNA, and Nano-computing. The However, a quantum computer need not diamond[2], ZnTe, GaP among others. The quest to realize a truly powerful computer be similar in architecture to the present protocols for quantum key distribution that utilizes the unparalleled parallelism day digital computer. That is, there are like BB84[3] are used in the QKD systems. off ered by quantum principles is still on. other schemes where logic gates are Effi cient single photon detectors are A quantum computer is envisaged for not essential. For example, in adiabatic available in the form of avalanche diff erent applications like Shor’s algorithm quantum computing the system with photodiodes (APDs), photomultiplier for factoring large numbers and eventually a large network of interacting qubits is tubes and more recently superconducting to study quantum mechanical systems turned on by preparing various states detectors with very high effi ciency. One that are useful for futuristic applications in appropriately and let the system evolve may note that InGaAs APDs that work in diverse fi elds. through the interactions. The fi nal state telecommunication wavelength range are In the standard quantum computing of the system after all the interactions prone to more noise than the Silicon based schemes, a system is required to have gives the answer to the problem being APDs that work in visible to near infrared universal quantum logic gates. A computed. Another quantum computing wavelengths and superconducting detectors require cryogen temperatures to operate. In the context of making use of quantum principles, sources that generate entangled photons, photons with at least one of their properties (like polarization) correlated, or photons that are in superposition states are very useful. For example, entanglement is shown to increase the channel capacity[4]. So, the role of photonics in the fi eld of communications is well established.

In the context of making use of quantum principles, sources that generate entangled photons, photons with at least one of their properties (like polarization) correlated, or photons that are in superposition Fig. 1: Tables showing the operati on of cNot, Toff oli and Fredkin gates are in the top row. Bott om states are very useful row shows the schemati c of the quantum phase gate proposed by Kimble’s group in 1995

CSI Communications | February 2015 | 16 www.csi-india.org Qubit system Decoherence time scalability issues which were overcome by very interesting recent developments 29Si nuclear spins in 28Si 25 sec in the fi eld. Microwave photons are used Spin of trapped ions 15 sec to couple qubits in cavities made of Spin of trapped atoms 3 sec transmission line resonators[11] as well as Nuclear spin (NMR) 2 sec logic operations are demonstrated[12]. For planar architectures, another alternative Electron spin bound to 31P 0.6 sec is based on quantum dots which will be NV centre in diamond 2 msec discussed in this article. Photon polarization 0.1 msec The basic requirements for a quantum Electron spin in QD 3 μsec computer are qubits with long decoherence Superconducting Charge/Flux/Phase 4 μsec time (that is, very low interaction with the surroundings), logic gates, scalability Table 1: A comparison of some of the qubit systems studied so far among others. The choice of qubit limits the technology that can be used. For example, scheme that does not require universal technique is limited by the possibility after an initial lull, superconducting qubits gates is cluster state quantum computing. of molecules with distinct resonances have come back in vogue thanks to some It may be noted that, the present day that can be addressed and manipulated innovative recent research. NMR computing computers evolved a long way from fi rst independently. Similarly, trapped which showed the feasibility of quantum generation computers that occupied big atoms and ions are also successfully computing is still limited by the number rooms and required high power and punch demonstrated and are advantageous of possible qubits, bulkier size etc. Table 1 cards. The invention of transistor was a due to the extreme long decoherence shows a comparison of some of the qubit big game changer which, probably, came times possible in these systems. Trapped systems that are studied. The most feasible at the most opportune time. Regarding atoms or ions are addressed by optical and well accepted scheme for quantum quantum computer, though there are beams. Unlike these two systems, for computing networks is to have localized proof of concept demonstrations and linear optical quantum computing, using logic operations of qubits and connect several technologies being pursued, we basic optical components, quantum diff erent parts of the circuit or network are at a stage where we are looking for computing schemes were demonstrated. by “fl ying” qubits which carry information major breakthroughs which will help us More recently, there are several on-chip from one part to the other. Photons with realize a quantum computer. demonstrations of technology for linear their interesting properties like being the Of the several technologies that optical quantum computing[9]. Another fastest, non-interacting etc off er to be the are being pursued, the success of any fast evolving fi eld is the superconducting best possible fl ying qubits. In the following, system depends on the scalability so quantum circuits based on charge or various basic components required for that larger number of qubits is possible. fl ux or phase qubits. Though were fi rst quantum dot based quantum information In addition, the qubits should have long demonstrated by Nakamura et al[10], had processing circuits are described. decoherence times which is a measure of the interaction of the system with the environment. For high fi delity devices, long decoherence times (time before which the coherence is lost) are required. To put it in a nut shell, to realize a quantum computer, one needs a system in which we can address and measure individual quantum systems while keeping them isolated from environment. Three major fi elds that gave the initial breakthroughs are nuclear magnetic resonance (NMR[6], trapped atoms and ions[7] and linear optic quantum computing[8]. In the NMR technique, liquid molecules with a large number of resonances, each of which can be a qubit were used. Logic operations with about 12 qubits were demonstrated. Scalability of NMR based

. . . . we are at a stage where we are looking for major breakthroughs which will help us realize a quantum computer Fig. 2: Schemati c of a planar circuit based on coupled caviti es

CSI Communications | February 2015 | 17 Several atom like properties of QDs are demonstrated like discrete energy levels, dressed states, single photon emission, entanglement, driven Rabi oscillations and control of single charge and spin excitation

proposed and demonstrated in 1984 that, photons can also be subjected to periodic modulation of refractive index which leads to band structure for photons. Analogous to crystals for electrons, crystals that exhibit energy band structure for photons are called Photonic crystals. They exist in nature like the patterns that give vibrant colours to butterfl y wings, peacock feathers etc. These can be made by having a stack of diff erent materials with diff erent refractive indices (1-dimenisonal) or can be 2-dimensional like an array of holes in a dielectric material or array of dielectric rods in a diff erent dielectric. These are shown schematically in the top row of Fig. 3. One useful feature of photonic crystals is, by a suitable modifi cation Fig. 3: Schemati c of one- and two- dimensional photonic crystals (top row) and defect induced (a defect) to the structure one can have caviti es (bott om row). Diff erent colours indicate materials with diff erent refracti ve index fi eld localization. That is, as the rest of the photonic crystal does not allow a photon, comparable to the electron wavelength with energy in the bandgap region, it Photons with their interesting (Bohr radius). This confi nement of is refl ected by the periodic structures properties like being the fastest, non- electrons to smaller regions discretizes surrounding and thus leads to localization interacting etc off er to be the best the energy levels like the particle in a box of a photon in a small volume. Schematics possible fl ying qubits problem one studies in basic quantum of the defect in a periodic lattice for 1-d mechanics course. These discrete states and 2-d are shown in the bottom row of Fig. 3. By solving Maxwell’s equations, Planar Architecture Based on Quantum help use QDs as solid state equivalent of atoms. One major diff erence though is by fi nite diff erence time domain or fi nite Dots in Photonic Crystal Cavities element method, the resonances, fi eld that, atoms in vacuum interact very little For photonic integrated circuits suitable for profi les and the cavity parameters are with surroundings and thus have very QIP, manipulation of single qubits with single calculated. Simulation results of a cavity long lifetimes. Interaction of electrons in photons is, ideally, essential. This requires structure with the central holes displaced a quantum dot with surroundings reduces high quality factor cavities so that the from their lattice sites (so called, L0 the coherence time of the electrons. For probability of interaction of single photons cavity) is shown in Fig.4 on the left. Also fault tolerant quantum computing, the with the qubit increases. A schematic of shown is a scanning electron micrograph short coherence time in QDs is considered an array of cavities that are coupled by image of a fabricated photonic crystal a setback. However, electron spins are waveguides is shown in Fig. 2. Some of the cavity on the right side of Fig. 4. While, cavity structures that are demonstrated are shown to have long coherence times of in the plane, light is confi ned by the microring[13] and microdisk[14] resonators the order of milli seconds making them periodic arrangement of holes the out of and photonic crystal[15] and pillared[16] good candidates for qubits. Several atom plane confi nement is achieved by having a cavities. One of the possible schemes is to like properties of QDs are demonstrated suspended bridge structure. use quantum dots (QDs) as qubit systems like discrete energy levels, dressed states, As photons can be localized or trapped that are embedded in photonic crystal single photon emission, entanglement, to very small regions (comparable to or cavities to achieve planar integrated circuits. driven Rabi oscillations and control of smaller than the wavelength of light), the The advantage of using semiconductor QDs single charge and spin excitation. photonic crystals with defects are called is that the optical nonlinearities could be Photonic Crystal Cavities microcavities. Light localization to smaller made use of. Electrons in a periodic array of ions or regions results in increasing the probability atoms experience spatially varying fi eld of interaction of photons with any material Quantum Dots as Solid State Equivalent which eventually results in the energy in the defect region. Thus, if one has a of Atoms band structure for electrons. Band quantum dot in the defect region, one can QDs are semiconductor nanostructures structure defi nes the allowed energy achieve cavity enhanced coupling of light to that confi ne electrons to regions levels for the electrons. Similarly, it was quantum dot. Modulation of light emission

CSI Communications | February 2015 | 18 www.csi-india.org . . . . the strong local fi eld generated at the interfaces when plasmon polaritons are excited could also be useful for QD based architectures

below the diff raction limit. Coupling of broadband light incident at any angle can be coupled to the active layer by [19] Fig. 4: Schemati c of a photonic crystal cavity structure formed by air holes in GaAs wafer along with plasmonic quasicrystal patterns . the calculated fi eld profi le in the defect region is shown on the left . Scanning electron micrograph To summarize, it is too early to image of a fabricated suspended air bridge cavity is shown on the right answer questions like, when a quantum computer will be realized, what from QDs and more importantly, single of the QD inside the cavity, controlling the technology will it be based on or what photon emitters were demonstrated with dimensions and shape of the QDs etc. will be the qubits or qudits it will use, QDs in cavities. Vertical cavities based on The quality factor achieved in a will it require logic gates like present day the so called distributed Bragg refl ector fabricated structure depends on the quality computers,... The current lead is, probably, mirrors above and below the QD layer were of the lithography which limits the quality of with trapped atoms and ions as well as also demonstrated to have high cavity-QD nanopatterns as well as the QD wafer itself. superconducting circuits, both of which coupling. To make a microcavity centered about a require complex experimental setups. The For planar architectures, photonic QD of dimensions of few 10s of nanometer, lead may change as several technologies crystal structures made on QD wafers are either one makes a large number of cavities are simultaneously being pursued. interesting. This involves QDs or other on a wafer and tests all of them to identify References nonlinear elements inside cavities that are cavities which have a QD in them or fi rst [1] P Michler et al. Nature 406, 968 (2000). connected to one another by waveguides gets a map of the QD positions (by imaging [2] E Gibney, Nature 505, 472 (2014). forming a network. This is schematically the luminescence) and makes a cavity [3] C H Bennett and G Brassard, Proceedings shown in Fig. 2. This confi guration would around a QD that is spatially identifi ed. The of IEEE International Conference help implement quantum information highest Q reported with QD embedded in a on Computers, Systems and Signal processing circuits using quantum dot spins cavity is still not suffi cient to observe single Processing, Bangalore, India, 1984. as qubits. One of the problems in using spins photon-QD coupling. Thus, the quest is on [4] C H Bennett, S Wiesner, Phys. Rev. Lett. 69, 2881 (1992). in planar architectures is, how to estimate to reach the strong coupling regime where [5] Q A Turchette et al. Phys. Rev. Lett. 75, the spin state from optical measurements? one may expect single photon level coupling 4710 (1995). A single waveguide supports only one of to the QD. [6] D G Cory, et al. Proc. Natl Acad. Sci. USA the polarization components and thus Coupling to and from photonic 94, 1634 (1997). atleast half the information will be lost with crystals is still a challenging issue but [7] D J Wineland, D J et al. J Res. Natl. Inst. Stand. Technol. 103, 259 (1998). a single waveguide. It has been shown that tapered waveguides have been shown [8] E Knill, R Lafl amme, G J Milburn, Nature with cross waveguide geometry, the spin to have very high coupling effi ciencies. 409, 46 (2001). state of QD can be estimated by measuring One of the biggest advantages of planar [9] R Okamoto et al. Proc. Natl. Acad. Sci. 108, the output of two orthogonal waveguides architectures presented in Fig. 2 is that 10067 (2011). and correlating the two outputs[17]. Similar one would be able to study entanglement [10] Y Nakamura et al. Nature 398, 768 (1999). [11] A Wallraff et al. Nature 431, 162 (2004). concept for hexagonal photonic crystal (coupled cavities) in addition to single [12] A Lupascu, et al. Nature Phys. 3, [18] lattice was also demonstrated . Some of photon logic operations and having single 119 (2007). the challenges in realizing photonic crystal photon emitters embedded in the circuit. [13] A Faron et al. Nature Photonics 5, 301 based planar circuits are, realizing high For the future, the strong local fi eld (2011). quality factor microcavities, effi cient input generated at the interfaces when plasmon [14] I Aharonovich, et al. Adv. Materials 24, OP54 (2012). and output coupling of photons, positioning polaritons are excited could also be useful [15] D Englund et al. Opt. Express 15, for QD based architectures. Plasmons 5550 (2007). could be used for coupling diff erent QDs [16] C Santori et al. Nature 419, 594 (2002). that are spatially separated. This may not [17] I J Luxmoore et al. Phys. Rev. Lett. 110, Light localization to smaller regions 037402 (2013). results in increasing the probability require the high precision fabrication that a photonic crystal microcavity demands [18] R J Coles et al. Opt. Express 22, of interaction of photons with any 2376 (2014) material in the defect region at present and plasmon mediation will [19] V G Achanta, Prog. Quant. Electron. 39, also help reduce the dimensions to well 1 (2015). n

Achanta Venu Gopal obtained his Ph.D. (Physics) from Solid State Electronics group at TIFR, Mumbai and Ph.D. (Electronics) from Tokyo University. He worked as a NEDO Fellow at FESTA Laboratories, Tsukuba, headquarters of Japanese national Femtosecond Technology Project between 2000 and 2003 and as a JST Fellow in the Quantum Information Technology group at NEC, Tsukuba, Japan between 2003 and 2004. He joined Department of Condensed Matter Physics and Materials Science at TIFR in 2004 where he is currently an Associate Professor. His current research interests are in plasmonics for manipulating the optical properties of materials as well as light harvesting

About the Author and in photonic crystal cavity based planar architectures. He is a Senior Member of IEEE and a Member of OSA.

CSI Communications | February 2015 | 19 Technical Hardik A Gohel* and Priyanka Sharma** *Assistant Professor, AITS, Rajkot Trends **Academician and Researcher Study of Quantum Computing with Signifi cance of Machine Learning

Introduction Quantum computing, also known as atomic computing is the research area persistent on development of the computer technology based on quantum theory and principles. The quantum theory describes the behaviour and nature of energy and substance on the quantum, which is atomic and subatomic, level. Development of the quantum computer, if realistic, would mark a leap forward in computing capacity far superior than from the abacus to a modern day supercomputer, with recital grows in the Fig. 1: Classical Computi ng billion-fold realm and further than. By following laws of quantum physics, the quantum computer, would gain huge more fl awed measurement of the quantum computing and conventional processing power through facility to be other value. or classical computing is, in quantum in multiple states, and use all possible In Fig. 1, we have explained classical computing we are architecturally using permutations simultaneously to perform computing system in which there are all possibilities to solve computational tasks. electrical signals as inputs and electrical problems where as conventional or Now, it is essential to understand signals as outputs. The in-between classical computing is the small part Quantum Theory before we are going to of these two there are classical Gates or subset of all these possibilities. apply it in our Information Technology which are working on input signals and Apart from this diff erence, a quantum and Communication Networking (ICTN) generating output signals. This is known computing system is thousands of time which becomes quantum computing. as classical computing system. faster than conventional computing to Actually, in 1990 Max Planck has Where as in Fig. 2, we have tried to solve very important types of problems. introduced the concept of quantum theory explain quantum computing system in A really tough problem like the big in which he has introduced the idea that which there is quantum state as an input number factorisation, that would take a energy exists in individual units, to which on which quantum Gates has been applied supercomputer years or decades to crack, he has given the name quanta, as does which generates measurement results as can be crunched by a quantum computer matter. Then after, many scientists have an output. in very little time at all. It doesn’t stop worked for more than 30 years to have The fundamental diff erence between over here. In conventional computing a modern understand of quantum theory. The Necessary Fundamentals of Quantum Theory • Energy, for example matter, consists of separate units, rather than exclusively as a constant wave. • Basic particles of energy as well as matter may behave like either particles or waves. Generally it depends on the conditions. • Basic particles’ movement is inherently random and because of that it is unpredictable. • The concurrent dimension of two complementary values, such as the location and momentum of a basic Fig. 2: Quantum Computi ng particle, is unavoidably fl awed. It is something like that more precise Instead of single bit processing in conventional computing, measurement of one value will give There are qbits in quantum computing

CSI Communications | February 2015 | 20 www.csi-india.org enigmatic. This is principally as of the scale of our regulatory experience quantum consequences are vanishingly small and can typically not be pragmatic directly. Subsequently, quantum computers surprise us with there capabilities. In Fig. 4, we have endeavoured model of quantum computing with Machine Learning. In middle of the fi gure there is quantum Gates are available based on quantum computing and encircle of it there are machines which learns continuously from quantum gates. To understand quantum computing with machine learning let’s look at an example of unstructured search. Example with Algorithm 1:- Consider a situation in which we are hiding ball in Fig. 3: NOT Gate by Classical and Quantum Computi ng a cabinet of million drawers. How many drawers, an individual has to open to program and process has to operate in Intelligence technologies includes Pattern fi nd out the ball? It is possible, if anyone sequence of the information it stored and Reorganization as well as Machine is a lucky person, to fi nd the ball in the one bit at a time, where as in quantum Learning. If any individual takes closer foremost few drawers but we can not computing process of all information look at capabilities, they can come across deny the situation in which an individual stored in all QBITS simultaneously. It with the solution of hard combinatorial has to inspect almost all of them. If we is a kind of imagination that instead of optimization problems, called by are computing this example we can fi nd millions of desktops are running side by mathematicians. The requirement of out an average peeks the ball will be 5, side rather than just one working on the solving such kind of hardest problem is so 00,000. By using quantum computing same problem. large server farms which are very next to technique, it is possible to perform such Let us take an example to understand impossible to build. kind of searching into 1000 drawers only. quantum computing more eff ectively. The quantum computing is a new This wonderful achievement is possible by The classical NOT-gate, we are trying to type of machine system can be helpful using Grover’s algorithm. This algorithm convert it into quantum analogue. here. The laws of quantum physics and is the quantum algorithm to search a The Classical NOT-gate, the left side its advantages provide new computational database which is not sorted with many 1/2 of above fi gure, fl ips its input bit over; capabilities represents as Quantum entries in O (N ) time by using O (log N) NOT (1) =0, NOT (0) =1. The quantum Computing. While quantum mechanics storage space. analogue, the QNOT also does this, but has been foundational to the theories Example with Algorithm 2:- Apart it fl ips all states in a superposition at the of physics for about a hundred years from Grover’s algorithm there is another same time is available on right hand side the picture of reality it paints remains algorithm of quantum computing with of above fi gure. So if we start with 3 qbits machine learning is Shor’s in the state|000} +|001} +2|010}-|011}- Algorithm. This algorithm is |100} +3i|101} +7|110} and apply QNOT most frequently used method to the fi rst qbits, we get |100} +|101} for sending encrypted data. +2|110}-|111}-|000} +3i|001} +7|010}. Shor's algorithm permits Quantum Computing is a kind of imagination tremendously quick factoring where instead of millions of desktops running of large numbers. A classical side by side there is rather just one working on computer can be sketchy at the same problem. taking 10 million or billion Quantum Machine Learning Relevance years to factor a 1000 digit Many services available by Google or number, where as by using others are classy depends on Artifi cial quantum computing it would take approx 20 minutes. Example with Algorithm Quantum Computing is a kind of 3:- This is most interesting imagination where instead of millions and effective example of of desktops running side by side there best usage of quantum is rather just one working on the same machine learning. In a problem. Figure 4: Quantum computi ng with machine learning banking transaction system

CSI Communications | February 2015 | 21 it is very hard to detect fraudulent problems which can also easily to implement quantum computing on bank transactions. It is time consuming solved by quantum computing. practical basis as it is not in exercise at the as well. In this situation quantum The above benefi ts are not limited present. but prime consideration. There are also computing with machine learning can References help here. This mathematical problem some drawbacks of quantum computing, [1] Hardik Gohel (2014) 'Looking Back can be optimized by using consensus while applies for machine learning, in the at the Evolution of the Internet', CSI algorithms which is also known as terms of computational formulation and Communications - Knowledge Digest for Boyd’s system. In this algorithm we are implementation. IT Community, 38(6), pp. 23-26 [Online]. using past data to train the model in Available at:http://www.csi-india.org/ Drawbacks of Quantum Computing (Accessed: 16th January 2015). hopes that it will work on future data. • It requires more memory to solve It is a pattern which means each node [2] Jacob West (2000) The Quantum complex problem includes more Computer, Available at:http:// updates its local variable with weighted summation. www.cs.rice.edu/~taha/ average of its neighbour’s values, and • Just like we are talking, it is not easy teaching/05F/210/news/2005_09_16. each new value is corrupted by an to design or formulate quantum htm#problems(Accessed: 1st January additive noise with zero mean. The computing. 2015). [3] Newbie (2012) quantum mechanical quality of consensus can be measured by • The cost and other hardware the total mean-square deviation of the resources such as entanglement, it is related expenses are very high in conjectured that an exponential advantage, individual variables from their average, the implementation of quantum which converges to a steady state Available at: http://askville.amazon. computing. com/makes-quantum-computer- value. This can be prepared on a single • The major drawback is, quantum faster-conventional/AnswerViewer. computer, with all the data in one place. computing is not used in practice till do?requestId=49405 (Accessed: 1st Many processors are used by machine date. January 2015). learning typically, each handling a little [4] Anonymous (2014) Quantum vs Classical bit of problem. But for a single machine Conclusion Computation, Available at:http://www. a consensus optimization approach can Quantum computing is the technique thphys.may.ie/staff/joost/TQM/QvC. work better if the problem becomes too which provides better and faster machine html (Accessed: 1st January 2015). large. In this, dataset is spited into bits learning. It is a current research trend in the [5] Study Material (2013) ADVANTAGES & DISADVANTAGES OF QUANTUM and disseminated across 1,000 agents fi eld of computer science and technology having some drawbacks which we have COMPUTER, Available at: http://www. which analyse their bit of data and each thestudymaterial.com (Accessed: 1st produce a model based on the data they discussed above. Machine learning is a January 2015). have processed. By applying this we can process which requires past data to predict [6] Hartmut Neven (2009) Machine Learning decrease incredible time of computing future and it is only possible by using high with Quantum Algorithms, Available which means a few movements instead demanding computational operations. at:http://googleresearch.blogspot. of many years. This model is not only These operations always require very in/2009/12/machine-learning-with- useful for detecting fraudulent bank long time which can be avoided by using quantum.html(Accessed: 11th January 2015). transactions but also useful for creating quantum computing technique. There are other applications and algorithms of [7] Jennifer Ouellette & Quanta Magazine an effective spam filter. (2013) How Quantum Computers and quantum computing apart from those Benefi ts of Quantum Computing Machine Learning Will Revolutionize Big discussed above. Finally, it is high time • It is useful to solve complex discrete Data, Available at: http://www.wired. com/2013/10/computers-big-data/all/ combinatorial optimization problems Machine learning is a process which (Accessed: 14th January 2015). easily. requires past data to predict future [8] Lin Xiao, Stephen Boyd, and Seung-Jean • In processing it is very faster and it is only possible by using high Kim (2013) Distributed Average Consensus • It provides better methods of demanding computational operations. with Least-Mean-Square Deviation Machine learning, which is really These operations always require very Available at: http://web.stanford. high-quality instead of improving long time which can be avoided by edu/~boyd/papers/pdf/lmsc_mtns06. classical methods. using quantum computing technique. pdf (Accessed: 15th January 2015). • There are other artifi cial intelligence n

Hardik A Gohel an Academician and Researcher, he is an Assistant Professor at AITS, Rajkot and active member of CSI. His research spans Artifi cial Intelligence and Intelligent Web Applications and Services. He also focuses on "How to make popular, Artifi cial Intelligence in study of Computer Science for various reasons" He has 28 publications in Journals and proceedings of national and international conferences. He is also working as a Research Consultant. He has published cover stories in CSI Communication Magazine by last year. He can be reached at [email protected]

Dr. Priyanka Sharma has worked in IT education field in teaching and research at Masters level for 16 years, published more than 100 papers, carried out Funded research projects, reviewers and editors of various journals and conferences and guiding PhD students in GTU and other recognized studies. Her area of interest is Knowledge Based systems and Information system security. About the Authors

CSI Communications | February 2015 | 22 www.csi-india.org Technical D G Jha*, Kimaya Ambekar** and Chinmay Palkar** *Professor & Area Chairperson – IT; Programme Coordinator – MCA K J Somaiya Institute of Management Studies and Research, Vidyanagar, Vidyavihar, Mumbai Trends **Academic Associates – IT; K J Somaiya Institute of Management Studies and Research, Vidyanagar, Vidyavihar, Mumbai Quantum Leap into High Performance Computing Environment

Introduction Field of computing technology too binary or two-state operations. A number Quantum theory or quantum mechanics have been exploring the use of quantum system using a base number or radix of 2 or quantum physics all refer to that branch theory into creating environment that is is known as a binary number system. Only of physics that deals with study of nature more and more effi cient. It all started in two symbols, 0 and 1, are used to represent and behaviour of matter and energy on 1959, when Richard P. Feynman proposed the numbers of this system. Each of these the atomic and subatomic level (i.e., at an idea of creating more massive symbols is referred to as binary digit or more nanoscopic scales). German physicist Max computers using quantum eff ects. simply a bit. Classical computer understand, Planck (1900) is credited with identifying 1985 saw David Deutsch proposing the process and store using bit as a smallest the existence of these units that became concept of quantum logic gates in order to unit of measurement. This is analogous to the fi rst instance of quantum theory. For enhance processing power of computers. quantum computing principles. his experiment presenting before the Peter Shor created an algorithm in 1984 In physics every object in the real world the reasons for radiation of glowing that used only 6/7-qubits (quantum world is considered to be made up of body that changes the colour from red to bits) to make some basic factorization. atoms, smallest unit of existence of matter. orange through to blue as the temperature First 2-qubit computer was developed in It was in 1937 when Alan Turing (of the body) rises; assumption that 1998 and in 2000 4-qubit and 7-qubit developed a machine comprising of lines [1] energy existed not only in matters but also computers were developed. of cell (referred to as tapes later on) which within individual units (termed as quanta) Quantum Computing Fundamentals could move back and forth that laid to and famous mathematical equation Any operation having either of the two evolution of quantum computing. Cells quantifying the concepts, was awarded possible outcomes is referred to as were made up of squares which could hold Nobel Prize in Physics in 1918.[10] Copenhagen interpretation and the many-worlds theory are the two major interpretations of quantum theory. The Copenhagen interpretation of quantum theory was proposed by Niels Bohr conceptualising that state of any object remains unknown and in reality it exists in all possible states concurrently till it remains unchecked. This he referred to as a principle of superposition.[10] The many-worlds (or multiverse theory) states that as soon as a potential exists for any object to be in any state, the universe of that object transmutes into a series of parallel universes equal to the number of possible states in which that the object can exist, with each universe containing a unique single possible state of that object.[10] Since then there has been several Fig. 1: The Turing machine outstanding contribution to quantum theory, notable being – (see table 1) either 0 or 1 and alternatively can be left Year Scientist Theorized blank. This Turing machine also contained an active element called ‘head’ or ‘state’ 1905 Albert Einstein Not just the energy, but the radiation too is which eventually would change the quantized property namely ‘color’ of the underneath 1924 Louis de Broglie The principle of wave-particle duality active cell. Also, read/write head 1927 Werner Heisenberg Proposed Uncertainty Principle component would read the symbol (0/1 or blank) and accordingly give instructions to 1935 Erwin Schrödinger Famous Schrödinger’s cat illustration perform the specifi ed task. (See Fig. 1) David Deutsch modifi ed the Turing [10] Table 1: Contributors to quantum theory Machine in 1985, by replacing binary

CSI Communications | February 2015 | 23 and radiotherapy, web search, fi nancial analysis, protein folding etc. NASA’s QuAIL (Quantam Artifi cial Intelligence Laboratory) team is aiming to use quantum computing to optimize the problems in aeronautics missions, space exploration and earth and space sciences. [6][9] Teleportation Transportation refers to transferring of (quantum) information. In quantum computation world, it is considered as moving or spinning state of electron from one place to other without aff ecting physical substance. Physicists at Kavil Institute of Nanoscience at Delft University of technology were successful in transporting information between two quantum bits which were separated by 3 meters. (see fi gure 4)[7] Machine Learning Objects such as trees, buildings, rivers etc Fig. 2: Diff erence between bit and qubit and concept of superpositi on can be easily defi ned, detected by the human being but when it comes to computers it computing gates with quantum logic gates researchers in the field of computing, becomes diffi cult since it involves large and called this new version as Quantum mainly so because of its application in amount of data and also there exist high Turing Machine (QTM). In which ‘state’ of the area of security (RSA algorithm) possibility of repeated patterns. Machine the tape could not only be either 0 or 1 but and artificial intelligence (robotics). For learning using quantum techniques are now also superposition of 0 and 1 (see fi gure 2); instance, a 129 digit number would take being used in object detection technology about 8 months and 1600 workstations which sense particular object, video (using convention computers – 1994). compression etc.[6] A thousand digit number(s) would Simulations therefore take 1025 years to complete Any real life object that can be converted the task. Shor’s into a model that replicates its behaviour Here, {|φ >= α|0 >+ β|1 >} algorithm using under a particular situation can be where, α & β are complex capability referred to as a simulation. Creating such numbers and of quantum models require large number of variables | α |2 + | β |2 = 1 computers (using (having diff erent domains and ever qubits) super- changing range) is a diffi cult proposition. positioning can For instance, Monte Carlo simulation is help expedite the a mathematical model of simulation that task of factorization employs large number of sample data. in about a million Fig. 3: Bloch Sphere: fundamental building block of quantum computers Such scenarios can be explored using steps.[3] [6][8] (& Qubits) quantum computing techniques. Optimization with Cloud Security (majorly cryptography) Artifi cial Intelligence which means the symbols could be either One of the distinct features of cloud Quantum computing concepts can be computing environment is that central 0/1 or any/all point(s) between 0 and 1.[2] used to determine best combination of servers placed at remote locations are Put simply, if there is a quantum possible solutions for a given problem. used for storage as well as processing computer using n qubits, it can be in any Super-positioning helps solve such of data. This means that their exists an superposition of up to 2n diff erent states optimization problems that include large obvious challenge for the service providers simultaneously (see Fig. 3) number of possibilities or probabilities to create an environment that is secure and when it comes to determining the solution. ensures complete privacy of users data. Quantum Computing Application Areas Some of the domains were this are being Researchers, using the power of quantum Factorization extensively researched are water network mechanics have created cryptographic Factorization has always been an area optimization, airline software testing and algorithm that aims at providing complete that attracted attention of most of the scheduling, early cancer cell detection secure cloud computing environment.[10]

CSI Communications | February 2015 | 24 www.csi-india.org of qubits by the user and then sending concepts into providing security through these qubits to quantum computer. These quantum cryptography. qubits then get entangled according to References a standard scheme. The entire task is [1] Anon (nd). “The Quantum computer: History measurement-oriented; the user maps and Development”. Available at http://ff den-2. the measurement instructions to the phys.uaf.edu/211.web.stuff/Almeida/main. particular state of each qubit and sends html [2] Bonsor K & Strickland J (2015). “How them to the quantum server. The results Quantum Computer Works”. Available at of the computation are then sent back to http://www.howstuffworks.com/quantum- the user for interpretation and utilization computer1.htm of results of the computation. Even if the [3] Braunstein S L (1995). “Quantum computation: a tutorial”. Available at http://www-users. quantum computer or an eavesdropper cs.york.ac.uk/schmuel/comp/comp.html tries to read the qubits, they gain no useful [4] Center for Quantum Technologies information, without knowing the initial (2102). “Quantum physics enables perfectly state; they are “blind.”[5] secure cloud computing: paper in Science”. Available at http://www.quantumlah.org/ Conclusions highlight/120120_blind_qc The exponential changes in the science [5] Darren Quick (2012). “Perfectly secure cloud of numbers and computing techniques computing possible thanks to quantum physics”. Available at http://www.gizmag.com/ have made mankind scale newer and quantum-cloud-computing-security/21260/ greater heights. The principles of quantum [6] Dwave (2014). “Quantum Computing: physics are now being applied in an Applications”. Available at http://www. increasing number of areas, including dwavesys.com/quantum-computing/ applications quantum optics, quantum chemistry, [7] Markoff J (2014). “Scientists Report Finding quantum computing. Furthermore, having Reliable Way to Teleport Data.” Available at achieved maturity level when it comes to http://www.nytimes.com/2014/05/30/ science/scientists-report-finding-reliable- way-to-teleport-data.html?_r=0 … when it comes to information [8] Palisade (2015). “Monte Carlo Simulation”. technology arena, the focus for Available at http://www.palisade.com/risk/ scientists across the globe has shifted monte_carlo_simulation.asp Fig. 4: Scienti sts report fi nding reliable way to making cloud-based transactions [9] NASA Quail. Quantum Artifi cial Intelligence to teleport data more secure by applying quantum Laboratory (2014). “What is Quantum theory concepts into providing security Computing?”. Available at http://www.nas. nasa.gov/quantum/ The user’s data staying perfectly through quantum cryptography. [10] Rouse M (2014). “Defi nition: Quantum encrypted using quantum computing was Theory”. Available at http://whatis. fi rst demonstrated by the scientists of the information technology arena, the focus techtarget.com/defi nition/quantum-theory Vienna Research Group and was referred [11] Stace T/Dr (2014). “Quantum Computer for scientists across the globe has shifted challenge cybersecurity”. Available to as “blind quantum computing” in the to making cloud-based transactions at http://www.abc.net.au/science/ said experiment.[4] more secure by applying quantum theory articles/2014/07/14/4045518.htm The process involves generation n

Prof (Dr.) D G Jha is currently working as Professor and Area Chairperson - IT at K J Somaiya Institute of Management Studies and Research. He has over 25 years of experience and has authored a text book in the area of computing concepts and Management Information System. He is a Ph.D from University of Mumbai. He is also the programme coordinator of MCA. His area of interests are computing concepts, DBMS, Information systems, and HRIS.

Ms. Kimaya Ambekar is Academic Associate- IT at K J Somaiya Institute of Management Studies and Research, Vidyavihar, Mumbai. She is a Masters in Computer Applications graduate from University of Mumbai and has two years of academic experience. Her areas of interests are Cloud computing, security, C# framework.

Mr. Chinmay Palkar is Academic Associate- IT at K J Somaiya Institute of Management Studies and Research, Vidyavihar, Mumbai. He is a Masters in Computer Applications graduate from University of Mumbai. His areas of interest are in computer science, software development and research, and robotics. About the Authors

CSI Communications | February 2015 | 25 Call for Contributions - CSI Communications – Programming.Learn() section Contributions are called for Programming.Learn section under Practitioner Workbench column of the CSIC magazine. You would be aware that recently we covered various articles on R language in this section. Prospective contributors are requested to send articles (1 page in length – around 1000 words). Those who intend to contribute a series of articles on a specifi c programming language are requested to send 2 or 3 sample articles and general plan of covering various aspects of the chosen language. These will be reviewed and then decision will be informed. Please send your contribution at the earliest to [email protected] with subject title as Contribution for Programming.Learn. (Issued on behalf of Editorial Board of CSI Communications)

CSI Communications | February 2015 | 26 www.csi-india.org Technical Tadrash Shah* and Chintan M Bhatt** *MS in Computer Science, Technology Analyst, Bank of America, New York Trends **Asst. Professor, Chandubhai S. Patel Institute of Technology, CHARUSAT

Quantum Computing: Fusion of Physics and Computers We are talking about a novel way to incorporate physics into the computers. Silicon and semiconductor phenomena have long since dominated the computer design and hardware, now we shift gears and come around with a totally new computer unknown to our predecessors. Google and NASA have teamed up for this paradigm shift and as expected, the results are mind-boggling. A Quantum computer has been designed by Google and NASA, fabricated by D-Wave Systems and installed at NASA – California. Fig. 1: Superpositi on analogy. Source: Snapshot from Google’s Video (htt ps://www.youtube.com/ History watch?v=CMdHDHEuOUE) Our classical computers have been around since long but Quantum computer atoms and molecules to perform memory Look at the diagram below. We are the most recent development. If we go and processing tasks. We use several know that atom can have only two spins by the Moore’s Law then every 18months concepts of quantum physics which are determining the value to be 0 or 1 (or at the processor capacity doubles; in that discussed as under: some places we choose them as +1 and case we can only imagine the amount 1. Superposition: As discussed in the -1). In case of the qubits, they can spin in of processing power we shall need by opening already, with QC (we shall any direction, allowing us values 0 and 1 the need of this century. Thanks to Paul refer quantum computer s as QC at same time or any value between them. Bernioff at Argonne National Laboratory henceforth) we store the data as 2. Entanglement: When we try to look who theorized the quantum computers in qubits where the memory can have at a qubit in superposition we can 1981. Actually he came up with quantum the values 0 or 1 or a superposition only fi nd whether the value is 0 or 1 Turing Machine where in the bits can be of 0 and 1. The superposition is whereas it actually would be having stored as qubits. Qubits are actually the actually the symbols both 0 and both the values. So in such a case, we superimposition phenomena of quantum 1 and all the points in between may not directly look at the value of physics. At a particular memory location them. As a QC can have multiple qubit. We need some indirect way a bit can have value either 0 or 1 in our states at the same time they can to know the value of a qubit. As the current classical computer, whereas be multifold powerful than today’s law of entanglement goes, we can qubits can be the values both 0 and 1. This classical systems. This can be make two atoms closely related by allows many parallel calculations on the quantified with a fact as this : applying outside force to two atoms. processor at the same time. As a memory a 30-qubit system is equivalent When this happens, the second atom location can have multiple values at any to 10 teraflops of today’s typical takes on the properties of fi rst atom. point in time, diff erent values can be used desktop system. And from the second atom, applying for diff erent calculations, hence allowing some quantum physics methods, we inherent parallelism. can know the value of our atom of We are not keen on going into interest. too much detail about the timeline of 3. Multiverse: Quantum computing development of quantum computers post does not deny, rather support the idea 1982 as that would make this article a of parallel universe. John Gribbin, a plain history informative. We rather aim at writer believes that making it more interesting, QC can work because they get their Background and Concepts processing power from some other As said earlier, by Moore’s law, by the parallel universe. That said, can be year 2020 or 2030 we shall need the interpreted as if you successfully circuits on microprocessor measured on build a quantum computer, you have atomic scale. And hence logically the next all the computers from some other Fig. 2: qubits can have multi ple spins. universe at your disposal. Well, to us, generation should steer us to quantum Source: Wikipedia computers where we harness the power of this may seem a little vague as we do

CSI Communications | February 2015 | 27 embedded&v=CMdHDHEuOUE)– You want to travel from Delhi to Mumbai and want to visit multiple cities enroute. Now this is a kind of classical optimization problem (similar to travelling salesman?). Now the route can be decided on basis of several parameters: cheapest ticket, least time, least number of tolls, shortest route, travelling in buses with good legroom, travelling in vehicles that provide seamless Wi-Fi connectivity, depending on best weather to visit a Fig. 3: Entanglement. Source: Snapshot from Google’s Video (htt ps://www.youtube.com/ particular city, carbon footprint of cities, watch?v=CMdHDHEuOUE) minimum layover times, meals provided, pet restrictions, seat availability and not know the cosmology behind all Applications Development the list goes on and on and on. This can this; yet what should fascinate us is Being the newest research development generate vast vast vast amount of data the processing power of these QCs. there are a few applications that are and then it needs to be consolidated and 4. Tunneling: The idea of quantum being targeted to the use of Quantum results to be generated. If these are the tunneling, i.e. a manifest of computers. As many researchers of the number of parameters that we want to Heisenberg’s uncertainty principle fi eld also agree, we still do not know consider then the data computation goes which ports the data to some other the right kind of the question to ask this beyond the capabilities of our current universe is also said to be used computer. We are still not fully aware of systems. But the quantum computers in design of quantum computers. the applications that can really harness the promise to deal with these. The atoms, electrons, photons or computing power of this magnitude. One With the optimism to make the other such subatomic particles of the many applications that are being self-driving cars and smart-homes are seen to cross a barrier without developed by the pioneers such as Google a reality, Google has partnered with seeming to have crossed it. The is, Google aims to use these for improving University of California, Santa Barbara. MIT Technology Review reports to its web search and advertising capabilities. These concepts, being of the domain of have simulated quantum tunneling Given the large amount of data that is Artifi cial Intelligence, require analysis and on a QC. That is to say that the generated in search and adverts, Google consolidation of humongous amount of mathematical behavior of one is optimistic about making correct use of data and thus huge amount of processing computer is reproduced on the other this computing power. Given that Google power which can only be provided by hence looking at one system tells you earns its more than two-thirds of revenue QC. Just for a gag, may be an algorithm all how another one would behave. from advertisements, it wants to ensure made for QC can outsmart Deep Blue in (http://www.technologyreview.com/ its advertising technology can outperform game of chess; again purely because of its view/427931/first-simulation-of- that of any other company. computing abilities. quantum-tunneling-on-a-quantum- The biggest and complex problem In a nutshell, the prime interest is to computer/) in mathematics is to factorize a large apply QC to machine learning algorithms All these concepts, due to brevity of number into two prime numbers. This is and thus to use it to understand and the mention here, may seem so uncanny an important problem because almost solve virtually any problem of the said and weird to the fi eld of computing but all encryption methods are based on this domain, ranging from cure of a disease trust us, if you can, these behavior of problem. The quantum computer must to understanding weather patterns to subatomic particles in a QC can open the be quickly able to identify these prime theoretical physics. avenues of astro-physics that we have numbers. If quantum computers become Challenges only heard off or scientists have only commonly available, which surely is not There are various challenges that are imagined thus far. going to happen soon, the current security foreseen with QC. Well, we are no extra- Quantum computing has now created and encryption algorithms are bound to ordinnaire to list them all but depending a new class of algorithmic problems in the fail. Currently the security algorithms that on the understanding and case studies complexity theory too called BQP and BPP we use be it RSA or SHA, are bound only that have been done to write this article, viz. Bounded error, Quantum, Polynomial by the computations that they require. But we can list a few to give you all a fl avor time and Bounded error, probabilistic, with this magnitude of computing power, of them. polynomial time. These are the problems they can easily break-in to. 1. A problem is because you have deal which can only be solved using probability Our favorite and a wonderful example with the subatomic particles, you theory in polynomial time. And these has been given by Google in a short can change their values inherently probabilistic problems can only be solved video they have made for introducing without even knowing it. Hence, the on a QC as it is the only set of problems this concept to the world (https://www. data integrity becomes critical. If we QC can solve. youtube.com/watch?feature=player_ try to look at a qubit in superposition,

CSI Communications | February 2015 | 28 www.csi-india.org it will return us the values either 0 or also questions the stability of the • Quantum Machine Learning 1 where as it should be operating at a quantum states. (including concept of Big Data) value in between 0 and 1 or both the 5. Programming of these computers has Conclusion values. steered D-Wave systems to a new So, we are taking the macro to the micro level; 2. Quantum computer can run only software architecture and language. or actually we are taking the phenomena of probabilistic algorithms and that too Every algorithm fed in should be Universe to the chips in the computer. Of with a rigid limit that the answer/ probabilistic one as already noted. course, the currently built computers are solution will be right with high Microsoft is also taking interest in of the size of a room, keeping the legacy of probability. Hence, our classical the same at Microsoft Research. their ancestors going. But eventually they algorithms that we have been using David Wecker from Cambridge is will evolve to fi t into our laptops. We no it so far cannot be used directly, associated with Microsoft for this longer live in an age where we see or need not even the overwhelmingly project and has already implemented an entire lifetime to see the research output comptatutional part of classical a software architecture called LIQUi materialize especially not if it is to build a algorithms be accelerated. which translated high level program, machine. 3. Current 16-qubit QC that has been representing quantum algorithm, designed by D-Wave systems to technology specifi c lower level References [1] http://www.theguardian.com/ requires a rigorous temperature program. control to be maintained on the chip. science/2014/mar/06/quantum- And hence, thought the chip is quite Current Research computing-explained-particle-mechanics [2] http://mashable.com/2013/10/13/ small in dimensions, the housing is Researchers of Princeton University have built a rice grain-sized device google-quantum-computing-video/ quite huge. And thus expensive to [3] http://computer.howstuffworks.com/ laser power-driven by single electrons maintain and operate. quantum-computer3.htm 4. There are people who doubt tunneling through artifi cial atoms known [4] http://www.theguardian.com/ whether QC designed and as quantum dots. They built the device commentisfree/belief/2009/oct/06/ fabricated by D-Wave systems which uses about one-billionth the multiverse-quantum-computers- really operate as a QC or not. As electric current needed to power a hair philosophy we cannot look inside the hood of dryer by exploring how to use quantum [5] http://en.wikipedia.org/wiki/Quantum_ quantum computing because that dots, which are bits of semiconductor computing [6] http://getpocket.com/a/read/740917422 would disturb the computation material that act like single atoms, as [7] http://www.nas.nasa.gov/quantum/ reason being that when we see the components for quantum computers. [8] http://www.dwavesys.com/tutorials/ state of atom which is its spin then Currently researchers are doing research background-reading-series/introduction- the superposition gets disturbed on following topics: d-wave-quantum-hardware as explained earlier), these doubts • Quantum Internet [9] http://phys.org/news/2015-01-rice- are raised and so far there is no • Quantum Chips sized-laser-powered-electron-bodes.html way out found to prove it. And this • Quantum Computer Networks n

Tadrash Shah has completed his B.E. in Computer Engineering from Gujarat Technological University in 2012. Prior to starting his M.S. in Computer Science from State University of New York at Stony Brook, he worked on projects with IIT- Gandhinagar, IIT-Bombay, IIM-Ahmedabad and United Nations. He has been serving as Technical Program Committee Member on several conferences and has many research publications. Currently he is working at Technology Analyst at Bank of America Merrill Lynch in New York. His research areas include - High Performance Computing, Algorithms and Database. Teaching also interests him apart from his coveted corporate job.

Chintan M Bhatt has received B.E. and M. Tech. Degrees from Gujarat University (CITC (now CSPIT)) and Dharmsinh Desai University in Computer Engineering. He is currently pursuing PhD in Computer Science. He is a member of CSI, AIRCC (Academy & Industry Research Collaboration Center), IAENG (International Association of Engineers), ISTE, IEEE, SDIWC, EIA etc. His areas of interest include Data Mining, Web Mining, Networking, Mobile Computing Security and Software Engineering. He has more than 4 years of teaching and research experience. He is working as a Technical Program Committee member/Reviewer in many reputed international journals/conferences. About the Authors

CSI Communications | February 2015 | 29 CSI Communications – Suggestions Invited for Cover Themes of forthcoming issues

Greetings from the Editors of CSI Communications! We are in the process of planning themes for future issues from April 2015 onwards and think that your inputs at this stage would be valuable. So here is a request to all of you to give suggestions regarding Cover Themes for forthcoming issues. This will help us to be on the same wavelength as you all. So start scratching your heads and provide suggestions and send these as soon as possible. We shall fi nalize the topics before end of February 2015 and so please send your email to [email protected] with subject title as Cover Themes for CSIC Future Issues on or before 28th Feb. 2015. (Issued on behalf of Editorial Board of CSI Communications)

CSI Communications | February 2015 | 30 www.csi-india.org Research Martin Laforest Front ** Senior Manager, Scientifi c Outreach, Institute for Quantum Computing, University of Waterloo, Canada

Researchers at the Institute for Quantum Research Focus Computing (IQC) are uncovering the reality Quantum sensors will play a critical Quantum Computation role in material science, neuroscience, of the microscopic world and harnessing Quantum computation involves personalized medicine, geological the power of quantum mechanics to create manipulating information using the rules exploration and more next-generation technologies that promise of quantum mechanics. These rules off er to transform our world. Ultra-powerful a much richer environment and allow Quantum Sensors computers, unbreakable cryptography, researchers to solve problems that are Sensors that behave uniquely according to quantum devices, quantum materials deemed intractable using the classical the laws of quantum mechanics have the and nanotechnologies of unprecedented laws of physics. From material science to potential to achieve the highest precision, precision are some of the discoveries being database search to optimization problems, selectivity and effi ciencies allowed by pioneered at the institute based at the the impact of quantum computation are as nature. Quantum sensors will play a critical University of Waterloo. varied as they are transformational. role in material science, neuroscience, World-Class Science personalized medicine, geological exploration and more. IQC at the University of Waterloo was From material science to database founded to conduct world-leading search to optimization problems, the Quantum Materials fundamental and applied research impact of quantum computation are as Quantum systems are inherently fragile. in quantum information science varied as they are transformational The investigation of novel types of materials and technology. That research will that exhibit stable quantum behaviours will lead to applications in computing, Quantum Communication be critical in bringing quantum technologies communications, sensing and applications From the transmission of classical and out of the lab and into the marketplace. that we haven’t yet imagined. IQC attracts quantum information to unbreakable Ongoing Outreach Activities the world’s top researchers and provides information security, research in A vibrant outreach program complements them with cutting-edge infrastructure, quantum communication will lead to new and showcases the research to bring IQC’s collaborative opportunities and intellectual effi ciencies and protocols with no classical research to the world — and bring the world freedom necessary for breakthroughs counterpart. Short distance quantum key to IQC. IQC holds public lectures throughout to happen. Researchers are appointed distribution networks are being established the year featuring world-class researchers in to both IQC and one of six departments around the world and IQC has active the quantum world. In the past, we hosted across three faculties at the University of projects for satellite-based global quantum talks from faculty members such as IQC Waterloo. communication. Executive Director, Raymond Lafl amme, Canada Excellence Research Chair David Cory and distinguished guests including John Preskill, Alain Aspect and Physics Nobel Prize co-recipient, Serge Haroche. Every couple of years, IQC welcomes the local community to learn more about our research through an Open House visited by more than 1,200 visitors. This featured hands-on science exhibits in the

Fig.1: Depositi on system to engineer novel quantum materials for applicati on in quantum science Fig. 2: IQC researchers discussing low- and technology at IQC, University of Waterloo temperature experiments

CSI Communications | February 2015 | 31 the world to be bold and curious, to keep pushing the limits of what they know and to help them develop an intuition about quantum physics. Not only do they collaborate and learn about one of the most rapidly developing fields in science today, but they experience living on a university campus while being surrounded by peers who share the same interests. Giving Undergrads Hands-on Experience For those students looking to gain more knowledge about quantum information, the Undergraduate School on Experimental Quantum Information Processing (USEQIP) gives third-year undergraduate students an unprecedented experience. Each summer, this two-week program inspires students to pursue graduate studies in quantum information. Approximately 20 students attend Fig. 3: Quantum Kids Science Show featuring the author this workshop from all over the globe. They attend classroom lectures on the Kids Zone and Discovery Zone hosted by widespread interest and involvement fundamentals of experimental quantum IQC students and various local outreach in science through quantum-themed information – such as magnetic resonance, initiatives, a “Meet a Scientist” zone activities and workshops. optics, superconducting qubits, quantum where visitors could speak directly to Each summer we accept about 40 dots and many more. The students also IQC researchers about their work, as well high school students into the Quantum spend more than 25 hours working on as tours of state-of-the-art laboratories Cryptography School for Young Students experiments in IQC labs to put what they focused on optics, low-temperature (QCSYS). It aims to teach students have learned from the lectures into practice. physics, quantum cryptography and the tricky mathematics and physics Many students stay at IQC following nanofabrication. It also included a behind quantum cryptography in just USEQIP with an Undergraduate Research Quantum Kids Science Show for children eight days. The team encourages these Award. (URA). It provides students the of all ages. exceptional young adults from around opportunity to work alongside an IQC Bringing Quantum to the High School Crowd At IQC, we host high school students and teachers throughout the year for tours and hands-on workshops. This introduces both students and teachers to quantum research through short tours of our advanced facilities or a full-day workshop. Our workshops include an introduction to Quantum Information Science and Technology, an introduction to quantum cryptography and a demonstration of superconductivity. IQC also visits several high schools through partnerships with other local scientifi c outreach initiatives. Working with our partners, we look to generate

. . . workshops include an introduction to Quantum Information Science and Technology, an introduction to quantum cryptography and a demonstration of superconductivity Fig 4: Group work during QCSYS

CSI Communications | February 2015 | 32 www.csi-india.org (a) (b) (c)

Fig. 5: The Insti tute for Quantum Computi ng is hosted in the Mike & Ophelia Lazaridis Quantum-Nano Centre. The Lazaridis Centre was built with the most stringent scienti fi c controls against vibrati on, temperature fl uctuati ons, electromagneti c radiati on and more, enabling research and discovery at the forefront of science.

Table 1: Training and Outreach off erings of IQC

• Unique collaborative Master’s and PhD programs in Quantum Information • Strong postdoctoral fellowship program • Collaborative Research and Training Experience (CREATE) programs: Neutron Science and Engineering of Functional Materials and Building a Workforce for the Cryptographic Infrastructure of the 21st Century (CryptoWorks21) • Undergraduate School of Experimental Quantum Information Processing (USEQIP) • Quantum Cryptography School for Young Students (QCSYS) • Quantum Key Distribution (QKD) Summer School • Collaboration with high school programs for gifted students faculty member or a Research Assistant and experimental aspects of quantum Professor for the rest of the summer. This . . . QKD Summer School enables communication with a focus on quantum unique opportunity to interact within an graduate students to perform their cryptography. By providing a solid interdisciplinary research community own independent research foundation in relevant approaches and allows students to prepare for graduate techniques, QKD Summer School enables to Master’s and PhD degrees from one studies and research careers while graduate students to perform their own of six departments within the Faculties of gaining a broad exposure to the field of independent research. Mathematics, Science and Engineering. quantum information processing. URAs Potential research topics are varied Getting Ready for the Next Quantum are also available during the fall and but can essentially be classifi ed in four Revolution winter terms. categories: quantum computing, quantum By preparing future generations with the Preparing for a Career in Quantum communication, quantum sensors and knowledge to lead us through the next The University of Waterloo, in quantum materials. Students particularly quantum revolution, IQC will continue collaboration with IQC, off ers graduate interested in cryptography are not only to be a leading force with signifi cant students a unique opportunity to learn able to pursue it through our degree advancements in quantum information about and engage in world-leading program, but also IQC’s Quantum Key research. The drive for excellence will research in quantum information. The Distribution Summer School (QKD) see the research spark new technologies, research-based interdisciplinary graduate every second summer. This fi ve-day employ future generations and change the program in Quantum Information leads program concentrates on the theoretical way we live, work and play. n

Martin Laforest is the Senior Manager, Scientifi c Outreach at Institute for Quantum Computing, University of Waterloo, Canada. The major part of his role is to bring science out of the lab and into people’s lives. Martin leads IQC’s strategic outreach programs including the Undergraduate School on Experimental Quantum Information Processing (USEQIP) and the Quantum Cryptography School for Young Students (QCSYS). He also leads the academic outreach for the collaborative graduate program in quantum information at the University of Waterloo. He is actively involved in industry and government relations at IQC bringing my scientifi c knowledge and experience to the discussions. Martin Laforest holds a PhD in quantum physics from the University of Waterloo, as well as an undergraduate degree in Mathematics and Physics at McGill University. He is a passionate advocate for communicating science and share my passion with audiences around the world as a guest speaker and lecturer. He can be reached at [email protected], and 519-888-4567 x38931 About the Author

CSI Communications | February 2015 | 33 Practitioner Ivar Jacobson* and Ed Seidewitz** *Founder and Chairman, Ivar Jacobson International (IJI) Workbench **CTO Americas, Ivar Jacobson International

Software Engineering.Tips() » A New Software Engineering

Reprinted from ACM Queue, Volume 12, issue 10, November 29, 2014 with permission from authors

What happened to software engineering? What happened to the use this theoretical foundation as the basis of a careful, disciplined promise of rigorous, disciplined, professional practices for software approach to designing the structures they are to build. development, like those observed in other engineering disciplines? Of course, such structures still sometimes fail. When they do, What has been adopted under the rubric of "software however, a thorough analysis is again done to determine whether engineering" is a set of practices largely adapted from other the failure was caused by malfeasance or a shortcoming in the engineering disciplines: project management, design and underlying theory used in the original design. Then, in the latter blueprinting, process control, and so forth. The basic analogy case, new understanding can be incorporated into the foundational was to treat software as a manufactured product, with all the practice and future theory. real "engineering" going on upstream of that—in requirements Construction engineering serves as an example of how a true analysis, design, modeling, etc. engineering discipline combines craftsmanship with an applied Doing the job this way in other engineering disciplines makes theoretical foundation. The understanding captured in such an sense because the up-front work is based on a strong foundational accepted foundation is used to educate entrants into the discipline. understanding, so the results can be trusted. Software engineering It then provides them with a basis for methodically analyzing and has had no such basis, so "big up-front design" often has just not addressing engineering problems, even when those problems are paid off . Indeed, the ethos of software engineering has tended to outside the experience of the engineers. devalue coders (if not explicitly, then implicitly through controlling From this point of view, today's software engineering is not practices). Coders, though, are the ones who actually have to really an engineering discipline at all. make the software work—which they do, regardless of what the design "blueprints" say should be done. What is needed instead is a new software engineering built on the experience of software craftsmen, capturing their What has been adopted under the rubric of "software understanding in a foundation that can then be used to engineering" is a set of practices largely adapted from other educate and support a new generation of practitioners engineering disciplines: project management, design and blueprinting, process control, and so forth What is needed instead is a new software engineering Not surprisingly, this has led to a lot of dissatisfaction. built on the experience of software craftsmen, capturing Today's software craftsmanship movement is a direct their understanding in a foundation that can then be used to reaction to the engineering approach. Focusing on the craft of educate and support a new generation of practitioners. Because software development, this movement questions whether it even craftsmanship is really all about the practitioner, and the whole makes sense to engineer software. Is this the more sensible view? point of an engineering theory is to support practitioners, this Since it is the code that has to be made to work in the end is essentially what was missing from previous incarnations of anyway, it does seem sensible to focus on crafting quality code software engineering. from the beginning. Coding, as a craft discipline, can then build How does the software community go about this task of on the experience of software "masters," leading the community "refounding" software engineering? to build better and better code. In addition, many of the technical The SEMAT (Software Engineering Method and Theory) practices of agile development have made it possible to create initiative is an international eff ort dedicated to answering this high-quality software systems of signifi cant size using a craft question (http://www.semat.org). As the name indicates, SEMAT approach—negating a major impetus for all the up-front activities is focusing both on supporting the craft (methods) and on building of software engineering in the fi rst place. foundational understanding (theory). In the end, however, a craft discipline can take you only so This is still a work in progress, but the essence of a new software engineering is becoming clear. The remainder of this far. From ancient times through the Middle Ages, skilled artisans article explores what this essence is and what its implications are and craftsmen created many marvelous structures, from the for the future of the discipline. Pyramids to Gothic cathedrals. Unfortunately, these structures were incredibly expensive and time consuming to build—and they Engineering is Craft Supported by Theory sometimes collapsed in disastrous ways for reasons that were A method (equivalently, methodology or process) is a description often not well understood. of a way of working to carry out an endeavor, such as developing Modern structures such as skyscrapers became possible software. Ultimately, all methods are derived from experience with only with the development of a true engineering approach. Modern what does and does not work in carrying out the subject endeavor. construction engineering has a fi rm foundation in materials This experience is distilled, fi rst into rules of thumb and then into science and the theory of structures, and construction engineers guidelines and, when there is consensus, eventually into standards.

CSI Communications | February 2015 | 34 www.csi-india.org In a craft discipline, methods are largely developed by requirements. This is done by producing software in small masters, who have the long experience necessary. In older times, increments, obtaining feedback in rapid iterations, and continually the methods of a master were closely guarded and passed down adjusting as necessary. only to trusted apprentices. In today's world, however, various Agile software development teams take charge of their approaches based on the work of master craftsmen are often own way of working. Such a team applies the methods it feels it widely published and promoted. needs for the project at hand as they are needed, adapting the As a craft develops into an engineering discipline, it is development process throughout a project. In eff ect, an agile team important to recognize commonality between the methods of needs to evolve and improve its methods in as agile a fashion as it various masters, based on the underlying shared experience of the develops its software. endeavor being carried out. This common understanding is then captured in a theory that can be used as a basis for all the diff erent . . . agile development focuses on supporting the practitioner methods to be applied to the endeavor. in building quality software, rather than requiring the In this sense, theory is not the bad word it is sometimes practitioner to support the process. treated as in our culture ("Oh, that's just a theory"). As noted earlier, having a theoretical foundation is, in fact, the key that A lack of agility in methods is a central failure of traditional allows for disciplined engineering analysis. This is true of materials software engineering. science for construction engineering, electromagnetic theory for Software is, by its very nature, malleable and (physically) electrical engineering, aerodynamics for aeronautical engineering, easy to change. A complicated software system, however, can and so forth. exhibit a kind of intellectual rigidity in which it is hard to make Of course, the interplay between the historical development changes correctly, with each change introducing as many or more of an engineering discipline and its associated theory is generally errors as it resolves. In the face of this, the response of traditional more complicated than this simple explanation implies. Engineering software engineering was to adopt process-control and project- experience is distilled into theory, which then promotes better management techniques such as those used to handle similar engineering, and back again. Nevertheless, the important point to problems with complicated hardware systems. realize here is this: traditional software engineering did not have From an agile viewpoint, however, the application of hardware- such an underlying theory. engineering techniques was a mistake. Agile techniques, instead, One might suggest that computer science provides the take advantage of the changeable nature of software, using quick underlying theory for software engineering—and this was, feedback cycles allowed by continuous integration and integrated perhaps, the original expectation when software engineering testing to manage complexity, rather than process control. As a was fi rst conceived. In reality, however, computer science has result, agile development focuses on supporting the practitioner remained a largely academic discipline, focused on the science in building quality software, rather than requiring the practitioner of computing in general but mostly separated from the creation to support the process. of software engineering methods in industry. While "formal So, how do you introduce agility into software-engineering methods" from computer science provide the promise of some methods? By looking at the basic things that practitioners actually useful theoretical analysis of software, practitioners have largely do—their practices. shunned such methods (except in a few specialized areas such as Methods are Made from Practices methods for precise numerical computation). A method may appear monolithic, but any method may be As a result, there have often been cycles of dueling analyzed as being composed of a number of practices. A practice is methodologies for software "engineering," without a true a repeatable approach to doing something with a specifi c purpose foundational theory to unite them. In the end, many of these in mind. Practices are the things that practitioners actually do. methods didn't even address the true needs of the skilled craft For example, the agile method of Extreme Programming is practitioners of the industry. described as having 12 practices, including pair programming, test- So, how to proceed? driven development, and continuous integration. The agile framework The creation of a complete, new theory of software Scrum, on the other hand, introduces practices such as maintaining engineering will take some time. Rather than starting with a backlog, daily scrums, and sprints. Scrum is not really a complete an academic approach, we can begin, as already mentioned, method but a composite practice built from a number of other by capturing the commonality among the methods that have practices designed to work together. Scrum, however, can be used proven successful in the craft of software development. This, in as a process framework combined with practices from, say, Extreme turn, requires a common way of describing, understanding, and Programming, to form the method used by an agile team. combining various software-development techniques, instead of That exemplifi es the power of explicitly considering how setting them up in competition with each other. methods are made up of practices. Teams can pull together the To see how this might be accomplished, let's take a closer look at practices that best fi t the development task at hand and the skills methods and the teams of practitioners that really use them. of the team members involved. Further, when necessary, a team Agility is for Methods, not Just Software can evolve its method not only in small steps, but also in more The current movement to promote agility in software development radical and bigger steps such as replacing an old practice with a complements the recognition of software craftsmanship. As the better practice (without having to change any other practices). name suggests, agile software development is about promoting Note how the focus is on teams and the practitioners in fl exibility and adaptability in the face of inevitably changing teams, rather than "method engineers," who create methods for

CSI Communications | February 2015 | 35 other people to carry out. Creating their own way of working is a new responsibility for a lot of teams, however, and it is also necessary to support a team's ability to do this across projects. It is also useful, therefore, to provide for groups interested in creating and extending practices, outside of any specifi c project, so they can then be used as appropriate by project teams. This can be seen as a separation of concerns: practices can be created and grown within an organization, or even by cross- organization industry groups (such as is eff ectively the case with Extreme Programming and Scrum); practitioners on project teams can then adopt, adapt, and apply these practices as appropriate. What assurance do project teams have that disparately created practices can actually be smoothly combined to produce eff ective methods? This is where a new software-engineering foundation is needed, independent of practices and methods but able to provide a common underpinning for them. Fig. 2: Tracking Progress with alphas The Kernel is the Foundation for Practices and Methods The fi rst tangible result of the SEMAT initiative is what is known as the kernel for software engineering. This kernel can be thought These alphas relate to each other as shown in Fig. 1. of as the minimal set of things that are universal to all software- Each alpha has a specific set of states that codify points development endeavors. The kernel consists of three parts: along the dimension of progress represented by the alpha. * A means for measuring the progress and health of an Each of the states has a checklist to help practitioners monitor endeavor. the current state of their endeavor along a certain alpha and * A categorization of the activities necessary to advance the to understand the state they need to move toward next. The progress of an endeavor. idea is to provide an intuitive tool for practitioners to reason * A set of competencies necessary to carry out such about the progress and health of their endeavors in a common, activities. method-independent way. Of particular importance is having a common means for One way to visualize the seven-dimensional space of alphas [1] understanding how an endeavor is progressing. The SEMAT kernel is using the spider chart shown in Fig. 2. In this chart, the shaded defi nes seven dimensions for measuring this progress, known as area represents how far an endeavor has progressed, while the alphas. (The term alpha was originally an acronym for abstract- white area shows what still needs to be completed before the level progress health attribute but is now simply used as the word endeavor is done. A quick look at such a diagram provides a good for a progress and health dimension as defi ned in the kernel. Many idea of where a project is at any point in time. other existing terms were considered, but all had connotations that The alphas can be made even more tangible by putting each clashed with the essentially new concept being introduced for the of the alpha states on a card, along with the state checklist in kernel. In the end, a new term was adopted without any of the old an abbreviated form (see Fig. 3). The deck of all such cards can baggage.) The seven dimensions are: opportunity, stakeholders, then fi t easily into a person's pocket. Although more detailed requirements, software system, work, team, and way of working. guidelines are available, these cards contain key reminders that can be used by development teams in their daily work, much like an engineer's handbook in other disciplines. A more complete discussion of the kernel and its application is available in previous work.[2,3] The kernel itself is formally defi ned as part of the Essence specifi cation that has been standardized through the Object Management Group.[6] In addition to the full kernel, the Essence standard also defi nes a language that can be used both to represent the kernel and to describe practices and methods in terms of the kernel. Importantly, this language is intended to be usable by practitioners, not just method engineers; for basic uses, it can be learned in just a couple of hours (the alpha state cards are a simple example of this). Of course, this ability to use the kernel to describe practices is exactly what is needed as a foundation for true software engineering methods.

Practices Built on the Kernel Enable Method Agility A practice can be expressed in terms of the kernel by: • Identifying the areas in which it advances the endeavor. Fig. 1: The Kernel alphas • Describing the activities used to achieve this advancement

CSI Communications | February 2015 | 36 www.csi-india.org practice does not prescribe what the items on the backlog must be, while the user- story practice does not prescribe how the team should manage the implementation of those stories. The two practices are thus complementary and can be used together—but, when so combined, they overlap. The two practices can be connected in a smooth and intuitive way within an overall method by identifying backlog items from the one with user stories from the other, so that user stories become the items managed on the backlog. Note, in particular, how the common framework of the kernel provides a predictive capability. A construction engineer can use materials science and the theory of structures to understand at an early stage whether a proposed building is likely to stand or fall. Similarly, using the kernel, a software developer can understand whether a proposed method is well constructed, and, if there are gaps or overlaps in its practices, how to resolve those. Further, through the separation of concerns discussed earlier, an organization or community can build up a library of practices and even basic methods that a new project team may draw on to form its initial way of working. Each team can then continue to agilely adapt and evolve its own methods within the common Essence framework.[4] Ultimately, the goal will be, as an industry, to provide for the standardization of particularly useful and successful practices, while enhancing, not limiting, the agility of teams in applying and Fig. 3: Alphas made tangible with cards adapting those practices, as well as building new ones as necessary. And that, and the work products produced. fi nally, is the path toward a true discipline • Describing the specifi c competencies needed to carry out of software engineering. these activities. Conclusion A practice can also extend the kernel with additional states, The term paradigm shift may be a bit overused these days; checklists, or even new alphas. nevertheless, the kernel-based Essence approach to software The critical point is that the kernel provides a common engineering can quite reasonably be considered to be such a framework for describing all practices and allowing them to shift. It truly represents a profound change of viewpoint for the be combined into methods. Bringing a set of practices into this software-engineering community. common system allows gaps and overlaps to be more easily When Thomas Kuhn introduced the concept of a paradigm identifi ed. The gaps can then be fi lled with additional practices shift in his infl uential book, The Structure of Scientifi c Revolutions,[5] and the overlaps resolved by connecting the overlapping practices he stressed the diffi culty (Kuhn even claimed impossibility) of together appropriately. translating the language and theory of one paradigm into another. For example, consider two practices: one about using a The software-development community has actually seen such backlog to manage the work to be carried out by a team (advancing shifts before, in which those steeped in the old paradigm have the work alpha), the other about defi ning requirements using trouble even understanding what the new paradigm is all about. user stories (advancing the requirements alpha). The backlog The move to object orientation was one such shift, as, in many

CSI Communications | February 2015 | 37 ways, is the current shift to agile methods. In this regard, Essence can, indeed, be considered a paradigm The real shift, however, will only come as teams truly realize shift in two ways. First, those steeped in the "old school" of software the benefi ts of Essence today and as SEMAT builds on engineering have to start thinking about the true engineering of Essence to complete the new software engineering paradigm. software specifi cally, rather than just applying practices largely move along at some pace to reduce risks and achieve results. adapted from other engineering disciplines. Second, those in Further, Essence can allow organizations to simplify the software craftsmanship and agile communities need to see governance of methods, using a pool of practices that may be the development of a true engineering discipline as a necessary adopted and adapted by project teams. Having Essence as a evolution from their (just recently hard-won!) craft discipline. common foundation for this also allows practitioners to learn from In regard to the second point, in his foreword to The Essence of one another more readily. [3] Software Engineering: Applying the SEMAT Kernel, Robert Martin, The real shift, however, will only come as teams truly realize one of the SEMAT signatories, describes a classic pendulum swing the benefi ts of Essence today and as SEMAT builds on Essence to away from software engineering toward software craftsmanship. complete the new software engineering paradigm. A community Martin's assessment is correct, but it is important to note that this of practitioners is now contributing their experience and becoming proverbial pendulum should not simply swing back in the direction part of this "refounding" of software engineering—or, perhaps, it came. To the contrary, while swing it must, it now needs to swing really founding it for the fi rst time. in almost a 90-degree diff erent direction than the one from which it came, in order to move toward a new discipline of true software References engineering. [1] Graziotin, D, Abrahamsson, P 2013. A Web-based modeling There is, perhaps, hardly a better image for a paradigm shift tool for the SEMAT Essence theory of software engineering. than that. In the end, the new paradigm of software engineering, Journal of Open Research Software 1(1): e4; http://dx.doi. while building on the current paradigm of software craftsmanship, org/10.5334/jors.ad. must move beyond it, but it will also be a shift away from the [2] Jacobson, I, Ng, P-W, McMahon, P, Spence, I, Lidman, old paradigm of traditional software engineering. And, like all S 2012. The Essence of software engineering: the SEMAT paradigm shifts before, this one will take considerable time and kernel. ACM Queue 10(10); http://queue.acm.org/detail. eff ort before it is complete—at which point, as the new paradigm, cfm?id=2389616. everyone will consider its benefi ts obvious. [3] Jacobson, I, Ng, P-W, McMahon, P E, Spence, I, Lidman, Even as it stands today, though, using Essence can provide S 2013. The Essence of Software Engineering: Applying the a team with some key benefi ts. Essence helps teams to be agile SEMAT Kernel. Addison-Wesley. when working with methods and to measure progress in terms [4] Jacobson, I, Spence, I, Ng, P-W 2013. Agile and SEMAT— of real outcomes and results of interest to stakeholders. These Perfect Partners. Communications of the ACM 6(11); progress measurements are not only on one dimension, but along http://cacm.acm.org/magazines/2013/11/169027-agile- the seven dimensions of the kernel alphas, all of which need to and-semat/abstract. [5] Kuhn, T 1962. The Structure of Scientifi c Revolutions. University Essence can, indeed, be considered a paradigm shift . . . of Chicago Press. those steeped in the "old school" of software engineering [6] Object Management Group. 2014. Essence—Kernel have to start thinking about the true engineering of software and language for software engineering methods; specifi cally, rather than just applying practices largely http://www.omg.org/spec/Essence. adapted from other engineering disciplines. n

Dr. Ivar Jacobson is the Founder and Chairman of Ivar Jacobson International (IJI). Dr. Jacobson is a father of components and component architecture, use cases, aspect-oriented software development, modern business engineering, the Unifi ed Modeling Language and the Rational Unifi ed Process. His latest contribution to the software industry is a formal practice concept that promotes practices as the ‘fi rst-class citizens’ of software development and views process simply as a composition of practices. He is the principal author of six infl uential and best-selling books, and is a regular keynote speaker at software industry conferences around the world.

Ed Seidewitz is the CTO Americas of Ivar Jacobson International. Ed is experienced in agile system architecture and development in both the commercial and government sectors, ranging from business process analysis, to system architecture to full implementation of enterprise-class information systems, deployed in the data center or in the cloud. He has leading expertise in the Unifi ed Modeling Language (UML), including involvement in the continued evolution of the standard, as well as a background in state of the art information system technologies. Ed has strong skills in leadership, oral and written communication and technology transfer. He enjoys learning new things and teaching others. Ed’s specialties include: agile development, enterprise and system architecture, business and technical modeling, use case analysis, and UML. About the Authors

CSI Communications | February 2015 | 38 www.csi-india.org Vishnu Kanhere Security Corner Convener SIG – Humane Computing (Former Chairman of CSI Mumbai Chapter)

Case Studies in IT Governance, IT Risk and Information Security »

Quantum Computing – Boon or Bane? Quantum computing uses an entirely diff erent approach than classical computing. Classical computers that record, store and process data in bits (using two states 0 and 1) use transistors. Quantum computers use Qubits that can take multiple states 0, 1 or 0, and 1 and all points in between at the same time which is called superposition. This “quantum superposition”, along with the quantum eff ects of entanglement and quantum tunneling, enable quantum computers to consider and manipulate all combinations of bits simultaneously, making quantum computation powerful and fast. This inherent parallelism allows a quantum computer to work on a million computations at once, while your desktop PC works on one. A 30-qubit quantum computer would equal the processing power of a conventional computer that could run at 10 terafl ops (trillions of fl oating-point operations per second). Today’s typical desktop computers run at speeds measured in gigafl ops (billions of fl oating-point operations per second). Some of the systems under development use “quantum annealing” to solve problems. Quantum annealing “tunes” qubits from their superposition state to a classical state to return the set of answers scored to show the best solution. For a relatively new fi eld which is about 30 years old, Quantum computing has taken giant strides. Although quantum computers for practical computing are still a far away possibility, quantum computers are being built, albeit with restricted uses and capabilities. These capabilities and the enhanced speed and ability of Quantum Computers will enable tasks that have long been thought impossible (or “intractable”) for classical computers, which will now be achieved quickly and effi ciently by a quantum computer. But, all is not roses all the way and there are problems and issues too. One of the obvious issues is the threat that it poses to cryptography based security that uses symmetric algorithms, and even RSA and DSA. Quantum computing defi nitely poses a threat to internet security and security in the business, medical and even personal world of people who use computers. It will now be possible to use quantum computing to break the keys – which essentially require factorization of a very large number, in a very short time, making this kind of security vulnerable to compromise. But there are some ethical issues involved in Quantum computing too. Qubits as we have seen have a number of properties that distinguish them from classical bits. Most signifi cantly, the physics of qubits envisages that the state of a qubit at any given moment cannot be known in a classical sense. A qubit can be thought of as being both a 0 and a 1 simultaneously (in superposition). When the superposition is destroyed, the qubit becomes a classical bit, either a 0 or a 1, with a certain probability. The very nature of quantum computation is to manipulate that probability so that the correct result is most likely. The implication is that while most of the time the result will be correct, sometimes it will be wrong. Because the quantum sub process is effi cient, it is practical to compute in this way, in cases where a relatively easy check for correctness of the solution is available. Unfortunately, it will also be possible to use quantum sub processes to speed up algorithms for problems that do not have an easy check for correctness, thus calling the reliability of the results into question. What can go wrong or what issues could arise using such systems more frequently and on larger scale especially using quantum computers of diff erent power and capacity? Is it really safe to depend on systems for important business, welfare / social / health and personal decisions? Especially are users of these computers aware of their limitations and also really aware as to the true meaning and signifi cance of the solutions provided by these computers? These are signifi cant issues especially in the context of Ethics, Governance, and Security. Businesses and society need to consider these issues before progressively adopting and relying on these systems. Since research is at present ongoing and it is early days of Quantum Computing it is necessary to look into these aspects more closely. Given this background the current Case in Information Systems is being presented. The facts of the case are based on information available in media reports online information and real life incidents. Although every case may cover multiple aspects it will have a predominant focus on some aspect which it aims to highlight. A case study cannot and does not have one right answer. In fact answer given with enough understanding and application of mind can seldom be wrong. The case gives a situation, often a problem and seeks responses from the reader. The approach is to study the case, develop the situation, fi ll in the facts and suggest a solution. Depending on the approach and perspective the solutions will diff er but they all lead to a likely feasible solution. Ideally a case study solution is left to the imagination of the reader, as the possibilities are immense. Readers’ inputs and solutions on the case are invited and may be shared. A possible solution from the author’s personal viewpoint is also presented.

CSI Communications | February 2015 | 39 A Case Study of Niti Aayog of the State of Surashtra

NITI Aayog is a dynamic institution in the Purandas concerned as he was damage to the info sphere. The potential State of Surashtra, which will provide a pointed out two signifi cant reports damage comes from the (incorrect) concrete plan based on changing global The fi rst about Quantum Computers choice of probability thresholds and socio-economic structure and its impact and the End of Security: insuffi cient software safeguards to protect on the economy. It is expected to play a “The cryptosystem setup assumes that against incorrect responses. Computers pivotal role in the development of the a spy can eavesdrop on the connection, but do exactly as they have been programmed state in the years to come. it will take an unreasonable amount of time to do, and there will be large errors only if Yogiraj, the CEO of Niti Aayog (from dozens to millions of years depending they aren’t monitored properly. According has decided it’s high time to introduce on key length) to calculate a secret key and to him all these were human errors and Quantum Computing in the planning decrypt the connection. It turns out that blaming the Quantum Computing systems process. After his recent US trip where he quantum computers might help here. Using was just witch-hunting. has seen these systems work on problems Shor’s algorithm, a quantum computer Yogiraj who had already made up his at lightning speed, he is convinced that in comes to a fi nal state corresponding to solved mind, pointed out that at this stage any these days of complex decisions involving mathematical problems very quickly, almost debate was pointless and inputs provided interconnected economies in a globalised as fast, as an ordinary computer multiplying by Purandas were aberrations and could scenario adopting Quantum Computing is a couple of numbers. A quantum computer be taken care of by improving the system. the way forward for the Aayog. might fi nd the required large numbers very To reassure the old timers and He calls a meeting of his management quickly, helping an attacker calculate the the opponents, Yogiraj decides to team and shares his viewpoint. He secret key and decrypting the message.” call in Sumati an experienced analyst emphasizes that adopting Quantum The second one was the report who had experience and expertise in Computing will enable Niti Aayog to – that discussed “Is quantum computing Quantum Computing to help them • Open up and capitalize on inherently evil?” adopt it expeditiously. Sumati has been greater opportunities with less The report highlights – approached and has suggested a way human error • Ethical Concerns about the forward. Probability of Incorrect Results • Profi t from opportunities Solution between multiple scenarios and • Ethical Concerns about The Situation possibilities at a rapid pace Debugging Quantum Computing Quantum Computing is still under • Curtail computing and decision Solutions development and it will take a while before making costs and • Ethical Concerns about it reaches a large number of serious users. It • Enable a reasoned decision in an Quantum Computing and will take even more time before it becomes otherwise imperfect economy Encryption The quantum state is destroyed available to a large section of society. by using quantum computing Currently Quantum Computing is able to to tunnel through to the optimal in order to gain access to its classical information. In the destruction of the solve so-called “optimization” problems, solution. where there are a series of criteria all Purandas a renowned economist is quantum state, all quantum information is lost. The argument is that in this case, the simultaneously competing to be met, and an old timer. He and the chief secretary info sphere has been negatively aff ected by where there is one optimum solution that Manibhadra are not happy. The chief the loss of the quantum information which satisfi es the majority of them. statistician Kalpesh is elated at the at the very least is not commendable But there is no denying that Quantum prospect and is all set to work on the according to Information Ethics. computing is a practical tool for extremely new system. In fact he anticipates a fair Kalpesh points out that in any complex predictive analysis, and machine reduction in staffi ng and computing computational setting; it is not the learning where you need to assess many costs which can substantially fund the computation that is the potential source of variables and many patterns and test acquisition of the system. He is also happy models against it. This is relevant in the that being the latest and state of the art area of drug discovery, cyber security, technology and generally unintelligible to The quantum state is destroyed in business, fi nance, investment, health care, the masses as well as to the politicians order to gain access to its classical logistics, and above all in planning. There and little understood even by the cream information. In the destruction of are a number of government, professional, of society, results generated and decisions the quantum state, all quantum business and other applications—those taken based on these would need little information is lost. The argument is that involve solving complex optimization explaining and would rarely be questioned. that in this case, the info sphere has problems—that today would be too It is amidst these confl icting opinions in been negatively aff ected by the loss diffi cult to address with silicon computing. of the quantum information which at the Niti Aayog team that a go ahead is the very least is not commendable Traditional computers, including given and a time frame of one year is given according to Information Ethics. supercomputers, require substantial time to implement and roll out the system. to crunch that kind of big data. But scientists

CSI Communications | February 2015 | 40 www.csi-india.org have long theorized that a computer that from the consequences of qubit of the systems have with respect harnesses the often-peculiar principles of uncertainty through ethical care to the roll-out of large quantum quantum mechanics could perform these in development. On the other computers. kinds of calculations in a fl ash, and even hand, it will be the responsibility 5. Unforeseen Issues and solve problems that would take years for a of developers, to inform the Problems - If quantum normal computer to churn through. This is users of the probabilistic nature developers are careful and now becoming a reality with the advent and of the results of computations transparent about how they use of quantum computing. based on qubits. Users’ trust of manage the uncertainty of qubits, the info sphere is likely to The Consequences computational accuracy will be improve with the introduction of The State of Surashtra and its Niti Aayog based on how much users trust quantum methods. If quantum has to understand and appreciate this and the developers. If the widespread introduction of quantum developers are careless and be alive to these issues which cannot be computing is done in such a secretive about the uncertainty ignored when implementing and using way that mistrust in computing of their algorithms and quantum computing. It is a situation that becomes signifi cantly higher, this applications, the info sphere needs to be handled with care; quantum will have adverse societal eff ects. will be harmed. computing can only be ignored at peril and 3. Debugging Quantum as of now adopted with peril too. Computing Solutions – It is If quantum technologies are The Strategy impossible to make copies of anticipated wisely and gracefully introduced by the experts, decision The right strategy for the Niti Aayog will quantum registers and it is be to deal with each of these issues: makers and users, the info sphere impossible to inspect quantum could be enhanced; but if quantum 1. Ethical issues in Quantum registers part way through a technologies are allowed to undermine Computing – Security Concerns computation without destroying trust due to inadequate care, malicious - These need to be addressed the computation that is in use and negligent oversight, then the by developing security progress. At an ethical level, info sphere will be harmed. solutions based on Post- as new debugging techniques Quantum Cryptography. E.g. are developed, the probabilistic If quantum technologies are Use of Lattice- based systems. nature of quantum computation anticipated wisely and gracefully Developments such as these in should serve as a constant introduced by the experts, decision Post-Quantum Cryptography reminder to the debugger of makers and users, the info sphere could be enhanced; but if quantum are indeed required to keep us quantum software that no two technologies are allowed to undermine secure well into the future. quantum registers prepared trust due to inadequate care, malicious 2. Ethical issues in Quantum and treated identically can be use and negligent oversight, then the info Computing – Probability of assumed to register identical sphere will be harmed. Niti Aayog and Incorrect Results - The low-level information as is so often its key functionaries will do well to put of awareness of technical details done (and rightly so) with the in place adequate controls, sensitize the about quantum computing poses information stored in classical developers and take due care to address a serious trust issue. Future memory. these and newer threats and issues as quantum developers will be well 4. Human errors, unauthorized they emerge and follow best practices to aware of the probabilistic nature changes / alterations and make good and benefi cial use of Quantum of qubits. But most computer Rogue elements – The nature Computing. users will not be aware of of Quantum Computing An eff ective solution is generally this, nor will they want to be brings additional ethical expected to proceed on these lines. bothered about it. On one hand responsibilities that quantum n users will have to be shielded developers and those in charge

Dr. Vishnu Kanhere Dr. Vishnu Kanhere is an expert in taxation, fraud examination, information systems security and system audit and has done his PhD in Software Valuation. He is a practicing Chartered Accountant, a qualifi ed Cost Accountant and a Certifi ed Fraud Examiner. He has over 30 years of experience in consulting, assurance and taxation for listed companies, leading players from industry and authorities, multinational and private organizations. A renowned faculty at several management institutes, government academies and corporate training programs, he has been a key speaker at national and international conferences and seminars on a wide range of topics and has several books and publications to his credit. He has also contributed to the National Standards Development on Software Systems as a member of the Sectional Committee LITD17 on Information Security and Biometrics of the Bureau of Indian Standards, GOI. He is former Chairman of CSI, Mumbai Chapter and has been a member of Balanced Score Card focus group and CGEIT- QAT of ISACA, USA. He is currently Convener of SIG on Humane Computing of CSI and Topic Leader – Cyber Crime of ISACA(USA). He can be contacted at email id [email protected] About the Author

CSI Communications | February 2015 | 41 Debasish Jana Brain Teaser Editor, CSI Communications Crossword » Test your Knowledge on Quantum Computing Solution to the crossword with name of fi rst all correct solution provider(s) will appear in the next issue. Send your answers to CSI Communications at email address [email protected] with subject: Crossword Solution - CSIC February 2015 CLUES ACROSS 4. Uses entangled states and classical communication to transfer arbitrary quantum states from one location to another (7, 13) 5. Uses atomic quantum states to eff ect computation (7, 8) 7. A device which can be used to store or transfer information between independent quantum bits (7, 3) 8. Type of integer greater than 1 with no positive integer divisors other than 1 and itself (5) 9. A geometrical representation of the pure state space of a quantum bit (5, 6) 12. Term used in theoretical physics to express hypothetical “shortcut” through space and time (8) 14. A communication text in cipher or code (10) 15. A stable subatomic particle with a charge of negative electricity (8) 17. A mathematician who devised a quantum algorithm for integer factorization (5, 4) 18. A type of Quantum Logic Gate that prepares the input state in a superposition state (8) 22. The orientation of a photon’s vibrations (12) 23. A type of quasiparticle having properties intermediate between those of bosons and fermions (5) 24. A possible implementation of a quantum bit (7, 3) 25. Type of crystals that exhibit energy band structure for photons (8) 26. Term used to describe the stable superposition of states (8) DOWN 1. Quantum bit (5) 2. The vertical and horizontal polarizations (11) 3. A collection of n quantum bits (7, 8) 6. Data Encryption Standard (3) 10. Originator of the Grover database search algorithm used in quantum computing (3, 6) 11. A property of waves that can oscillate with more than one orientation (12) 12. An oscillation that travels through matter or space, accompanied by a transfer of energy (4) 13. An ambiguous state in which a particle can be both a “0” and a “1” (13) 16. A spectroscopic technique that detects species that have unpaired Did you know role of Doped Diamond in Quantum Computing? electrons (3) 17. Light particle (6) A defect is intentionally added to make 19. An elementary particle and a fundamental constituent of matter (5) a diamond doped. Physicists claim these 20. A self-reinforcing solitary wave that maintains its shape while it propagates at defects can be used to manipulate the a constant velocity (7) spin of quantum particles. Diamonds can 21. A type of Quantum Logic Gate whose second input is negated only when the fi rst input is true (4) play a major role towards better quantum computers and nanoscale sensors. Solution to January 2015 crossword (More details can be found in http://www.bbc.com/future/story/20130218-diamond-idea-for- quantum-computer)

We are overwhelmed by the responses and solutions received from our enthusiastic readers Congratulations! NEAR ALL correct answers to January 2015 month’s crossword received from the following reader: Er. Aruna Devi (Surabhi Softwares, Mysore) and Surendra Khatri (Senior CSI Member, Retired From Survey of India).

CSI Communications | February 2015 | 42 www.csi-india.org H R Mohan Happenings@ICT ICT Consultant, Former AVP (Systems), The Hindu & President, CSI Email: hrmohan.csi@gmail .com

ICT News Briefs in January 2015 The following are the ICT news and grievances online. entrepreneurship as a career option – headlines of interest in January 2015. They • NITI - National Institutions for IITM Director. Transforming India Aayog replaces • Online furniture vendor Urban Ladder will add have been compiled from various news & Planning Commission. 1,400 employees to its workforce this year. Internet sources including the dailies - The • Free land among sops Karnataka is • The demand is set to increase to 30,000 Hindu, Business Line, and Economic Times. off ering to IT fi rms moving to Tier-II/III skilled VLSI engineers per annum after 12 cities. months. Voices & Views • Online approval system soon for moving • TCS issues pink slips: techies scramble to • Kerala will be the fi rst State to go on heavy cargo. unionise NOFN. In two years, the entire Kerala • India, US to discuss social security, visas • Data analysis skills vital for jobs in the population will move to smartphones – ahead of Obama’s visit. banking sector – Bankers. BBNL chief. • Centre to implement Rs. 1,900-cr • Govt. to use 43,000 km of optical fi ber • The cost of a transaction at a bank branch e-governance project for ESIC. network and 6,000 railway stations is Rs. 40-50 on an average. But at an ATM • Cabinet approves 2G spectrum auction, across India in the skill development the cost drops to Rs. 10-12, and on the hopes to garner Rs. 64,800 crore. revolution. digital medium, it drops further to Rs. 2-3 • Rural BPO policy to improve skills, • TCS says only 1% about 3000 staff will be a transaction – Banking experts. economic conditions soon – Prasad, IT involved in ‘involuntary attrition’ this year. • At present the IT sector in Karnataka Minister. • Capgemini plans to recruit 20,000 in provides direct and indirect employment • Telecom industry fears expensive auction India by 2016. to 40 lakh people besides contributing as Centre squeezes 3G spectrum supply. • TCS to extend research scholarship Rs. 1.80 lakh crore to export revenue - SR • Digital knowledge bridge - ‘Gyan Setu’ programme for fi ve years to reach over Patil, Karnataka Minister for Planning and is set to help rural Indians derive the 200 additional doctoral research scholars Statistics, IT, BT, Science & Technology. benefi ts of IT in daily activities. in computer science, across India. • Cashless transactions only way to curb • AP Govt. proposes a 6000 Crore • BPO fi rm Omega Healthcare to hire 2,300 black money – Modi. optical fi bre project which aims at this year. • Artisans take e-comm route to better making available 10-15 Mbps broadband • Google India MD Rajan Anandan made in sales, life. connections each to 12 million homes at charge of S-E Asia too. • VLSI talent is in short supply in India about Rs. 150 per month and on-demand -industry sources availability of 100 Mbps to one Gbps Company News: Tie-ups, Joint Ventures, • The global market is now valued connection to every business enterprise. New Initiatives at $14.5 billion and may reach over • In a fi rst, Kerala allows mobile towers on • Tata Group will invest in future and $22 billion by 2017. govt land, buildings. emerging technologies in the digital and • The trading of ‘used’ software licences is • Centre refers plea on banning porn physical space – Mistry. legal in Europe. Dutch court to deliver its websites to Cyber Law Division. • IndusInd Bank has a special innovation judgment on second-hand/used . • Pre-Budget meet: IT industry wants tax team and was the fi rst to launch video • The present demand for USB sticks in incentives to set up data centres. banking, whereby bank offi cials can see India is at about 25-30 million units per • Coming soon, policy on Net neutrality, and talk to the customers over the phone. year, of which nearly 99% is imported – security – IT Minister. • Broadcom pledges support to cable Industry sources. • The digitisation of about 73 lakh SHGs is TV digitisation in India – to developing • PCs will die, robots and 3D printers will expected to result in better participation country’s fi rst home-grown Conditional rule – Kaspersky. in fi nancial inclusion scheme. Access System (CAS) for cable television. • Connect optical fi bre with power lines to • DoT agrees to Microsoft’s proposal to • Online classifi ed portal Quikr.com, realize India’s digital vision – Kalam. tap unused spectrum in terrestrial TV which is the business of used goods, • India is currently ranked 118 worldwide frequency bands for off ering broadband plans to provide delivery services to its on broadband speed, averaging 1.7 mbps services. subscribers. against over 20 mbps in Japan and Hong • Modi’s Digital India project delayed by • Google unveils Flight search tool. Kong. With approximately 14 million cable tangle. • Recently launched intelligent ATM (iATM) fi ber km laid for the last one decade, it is • Pricing 3G spectrum at Rs. 3,705 cr/MHz, developed by Chennai-based Leo Prime expected to reach 30 million fi bre km by Centre eyes Rs. 1-lakh crore mop-up. Payment Solutions comes with a button and 2017. But China is creating 200 million • India asks for US comments on draft IPR also will give non-fatal shock to crooks. fi bre km every year to bridge the digital policy. • New software technology known as divide. If we need to connect 600,000 • US, India to formulate smart city action Hotknot to transfer big fi les to another villages and the cities, then we need to plan in 3 months for Visakhapatnam, phone. lay maximum of 400 million fi bre km – Allahabad, Ajmer. • Samsung, known for its phones running Kalam. • Hyderabad to have the country’s biggest on Google’s Android operating system • E-commerce explosion threatens the start-up facility T-Hub funded and (OS), has launched its fi rst phone on its country’s 1.1 crore retail shops, which promoted by the Telangana State Govt. own Tizen OS. employ over 3.3 crore people. • E-commerce may soon come under the • Infosys creates $250-million fund for lens of nine ministries, RBI. start-ups. Govt, Policy, Telecom, Compliance • E-tailers setting up labs to innovate on • 3G spectrum: TRAI proposes 18% cut in IT Manpower, Staffi ng & Top Moves customer experience. reserve price at Rs. 2,720 cr/Mhz. • E-commerce hiring set for takeoff ; 50,000 • Yu Televentures has sold 10,000 Yureka • The Rs. 30,000-crore project NOFN jobs likely in 2-3 years. In India, most smartphones on Amazon in just 3 will be the digital backbone of India and e-commerce fi rms increased salaries by seconds. aims to take high-speed broadband 10-40 per cent in 2013 and 2014 and are • Airtel-Cisco to launch video conferencing connectivity to 2.5 lakh gram panchayats. paying annual salaries of Rs. 10 lakh to Rs. service. • RBI is looking to remove the two-factor 23 lakh at the entry level. • Pearson takes digital learning to classrooms authentication requirement for small- • Foxconn deadlock continues as union, with new mobile app – MyPedia which will value transactions up to Rs. 3,000 to management dig in. The factory has cost $2,000 annually for a child. make transactions easier. stopped production since December 22 • Infi beam introduces logistics platform • The AP Govt., to start an online window as there was no order from customers. www.shipdroid.com for online merchants. – Mee Kosam – to let people post their • We must encourage students to look at n

CSI Communications | February 2015 | 43 CSI Reports

From CSI SIG and Divisions » Please check detailed news at: http://www.csi-india.org/web/guest/csic-reports

SPEAKER(S) TOPIC AND GIST Division-V (Educations and Research) and IEEE Kolkata Section and C.V. Raman College of Engineering, Bhubaneswar Dr. V Chandrasekhar, Dr. Anirban Basu, Dr. KC Patra, Dr. RK Das, 22-24 December 2014: International Conference on “High performance Dr. Rachita Misra, Dr. Ajith Abraham, Dr. Dharmendra Prakash Computing and Applications (ICHPCA 2014)” Sharma, Bhanu Pratap Dash, Dr Anil Kumar, Manoj Nambiar & Dr. Uma Charan Mohanty Conference was inaugurated by Dr. Chandrasekhar who emphasized need of innovative research in India by citing Dr. CV Raman’s achievements. Dr. Basu discussed how supercomputing has changed from single core architecture to multi- core, distributed and hybrid models for the present day HPC demands. Organizers released book of program & abstracts and proceedings in CD form which was distributed to all. Around 150 delegates attended included delegates from China, Japan as well as IITs, NITs, IIITs, BITS, Central & State Universities, Engineering colleges, Corporate research departments & Govt of India research laboratories and faculty & students from local colleges. There were 8 technical sessions & 81 peer reviewed papers were presented which will be published in IEEE Xplore. Speakers delivered lectures on many aspects of effi cient architecture, networking, computational intelligence & applications of HPC. On closing day Dr. Mohanty spoke emphasizing demand for high performance computing in the Indian Context Guests on stage for releasing the book and proceedings and encouraged researchers and students pursuing studies in this fi eld.

Annual Student Convention of CSI

ESL Narasimhan, SV Raghavan, Dr. SS Mantha, TS Kohli, GS Kohli, 3-4 January 2015: Annual Student Convention of CSI HR Mohan, Dr. HS Saini, Dr. DD Sarma, Raju Kanchibotla, Sanjay Mohapatra, ML Saikumar, Gautam Mahapatra and Chandra Dasaka Chief Guest Narasimhan said that IT has changed entire global order making world a global village. He mentioned 3 parameters in taking up this challenge - Economic Power, Environment Security and Good Governance. Prof. Raghavan deliberated on convention objectives: To motivate students in engineering and other disciplines in state of art developments in ICT & to facilitate initiative to understand expectations of industry from freshers. Dr. Mantha explained role of AICTE in maintaining standards in engineering education. Dr. Saini briefed on courses run at GNI and on projects being executed in areas such as Solar Energy, Robotics, Entrepreneurship & Software development at GNI's Innovative Centre. Sessions were conducted on - Campus to Corporate, Carrier Opportunities, Entrepreneurship & Career Opportunities in Government & PSUs and Technology Enablement in Education. Certifi cates of merit and Hon. ESL Narasimhan, Governor of A.P.& Telegana being mementoes were presented for best papers and to fi rst two teams of Hackathon welcomed with bouquet. L-R: Dr HS Saini, TS Kohli & GS Kohli. and Devthon.

Patna Women’s College in Technical Collaboration with Division – I (Systems) Division – III (Applications) & Patna Chapter

Dr. Ranjit Verma, UK Singh, Atul Sinha, Dr. AK Nayak, Dr. MN 22 January 2015: National Seminar on “ICT and Women Empowerment” Hoda, Dr. Marie Jessie AC, Bhawana Sinha Seminar was inaugurated by Prof. Ranjit Verma. Prof. UK Singh and Atul Sinha were guests of honour. Ms. Bhawana Sinha introduced seminar theme & Prof. Nayak explained contribution of ICT for Women empowerment. Prof. Hoda talked about diff erent areas where women should empower themselves. Prof. Singh stressed upon larger participation of women in technical sector in general & ICT sector in particular. Atul Sinha advised women to be empowered without depending on others. Dr. Verma explained action & activities of empowered women of Indian history and pointed out that women can do everything good as their male counterpart. Altogether there were 5 keynote lectures, 4 invited lectures and presentations of 40 technical papers in two

Guests on stage for Nati onal Seminar parallel sessions apart from 30 contributions in Poster Presentation.

CSI Communications | February 2015 | 44 www.csi-india.org CSI News

From CSI Chapters » Please check detailed news at: http://www.csi-india.org/web/guest/csic-chapters-sbs-news

SPEAKER(S) TOPIC AND GIST DELHI (REGION I) Prof. (Dr) Gurdeep S Hura, VK Gupta and SD Sharma 17 December 2014: Golden Jubilee Celebrations Technical Talk on “Cyber Infrastructure for Emerging Computing Technologies: A New Global Perspective” Mr. Sharma said that cyber infrastructure is a challenging topic. Understanding its various aspects needs formation of information assurance curriculum & related research by students of multi-disciplinary majors. Dr. Hura explained that internet grew rapidly as general-purpose enabling infrastructure, upon which controls had to be superimposed in an ad hoc manner. However knowledge infrastructure is human-centered & optimized for particular resources and communities. Cyber infrastructure off ers advanced knowledge infrastructure for research & education that integrates diverse resources across barriers of geography & time & across subtle & complex barriers of discipline, community sector & jurisdiction. Dr. Ratan Datt a presenti ng memento to speaker

NASHIK (REGION VI) Chairman Girish Pagare and Hon. Secretary Sandeep 11 January 2015: Golden Jubilee Program and SWOT Analysis Group Work Karkhanis Program was attended by 40 participants. Girish Pagare shared journey of CSI for last fi fty years. He expressed gratitude towards all past & present Execom, Divisional, Regional and Chapter MC members of CSI, guidance provided by various professionals, support by educational institutes and mainly people of Nashik. Group work cum workshop was organized to conduct SWOT analysis of the chapter to make it more vibrant and eff ective. Workshop was moderated by Sandeep Karkhanis; based on ‘Kaizen’ principles. The brainstorming brought many insights. Golden Jubilee Program parti cipants CHENNAI (REGION VII) Dr. S Kannan, Ph.D.,CA, CISA, CISM 7 January 2015: Talk on “Vedic Self-Management” Talk was organized jointly with IEEE Computer Society, Madras chapter. Vedic self-management refers to the art of managing self as a wholesome entity at the physical, emotional, intellectual and creative levels. Talk was delivered by Dr. S Kannan who holds a Ph.D. in Commerce and another inter-disciplinary Ph.D. in Management and Sanskrit in the domain of Vedic Management.

Resource person while delivering the talk

CHENNAI (REGION VII) Ms. Mythili Prakash 28 January 2015: Model Exam for Plus Two State Board Students Chapter conducted Model Exam for plus two state board students for last 15 years to guide them to score good marks at fi nal examination. As part of spreading Institutional Membership to Schools, Ms. Mythili Prakash, an active CSI woman member gave tips to present plus two students to score high marks in Government Examination. She also stressed upon the importance of Institutional Membership for Schools.

Ms Mythili Prakash delivering ti ps to students at local school

CSI Communications | February 2015 | 45 SPEAKER(S) TOPIC AND GIST COCHIN (REGION VII) Dr. PT Mathew, SP Soman, Dr. U Krishnakumar and 30 October 2014: Annual Kerala State Student Convention of CSI, on Dr. MV Judy “Empowering Villages through Emerging ICTs” The event was inaugurated by Chief Guest Dr. PT Mathew, GM, BBNL and felicitation was given by SP Soman. Panel discussion on the theme was conducted. More than 100 participants registered. Few Contests like ICT Quiz, Poster Designing and Web designing were conducted and winners were awarded cash prizes and certifi cates. Website address is http://www. amrita.edu/asas/kochi/CSIevents.html

Eminent Guests & Dignitaries during inaugurati on

VELLORE (REGION VII) Govinda K and Jagadeesh G 15 September to 16 October 2014: Seminar series as a part of Golden Jubilee Celebration Chapter organized a seminar series on various technologies like Introduction to NOSQL DB, HTML5 & CSS3, SOFT SKILLS, LINUX-a student perspective, Introduction to Big Data, Introduction to Cloud Computing, Cyber Security Tools & Techniques, CMS Tool & Techniques, Search Engine Optimization and Open Source Tools for Cloud Computing by experts from industry and academia.

Resource person conducti ng the Seminar J Prabhakaran from Infosys & S. Sathish from IBM 10-11 January 2015: Two-days Workshop on “Big Data Analytics” Mr. Prabhakaran and Mr. Sathish covered Introduction to Big Data, Hadoop and applications in Healthcare. Around 60 participants attended the workshop.

Resource person and parti cipants during the Workshop

From Student Branches » (REGION - IV) (REGION - V ) SILICON INSTITUTE OF TECHNOLOGY, BHUBANESWAR HKBK COLLEGE OF ENGINEERING, BENGALURU

23-12-2014: In Student Research Symposium, Dr. Satyananda Champatirai, 06-11-2014 : Dr. Mala V Patil, HOD, Dr. T C Manjunath, Principal, Dr. Jaideep Talukdar, Dr. Manas Senapati, Dr. Saraju P. Mohanty, Mr. Sanjay Mr. Rajesh R Nambiar, EMC Corporation, Mr. Abdul Hameed , Mr. Chandar Mohapatra P Mannar, Chairman, CSI-BC, Mr. H R Mohan, President CSI and Mr. Vishwas Bondade, RSC-CSI during Karnataka State Students Convention.

CSI Communications | February 2015 | 46 www.csi-india.org (REGION-V) (REGION-VI) CMR TECHNICAL CAMPUS, HYDERABAD K. K. WAGH INSTITUTE OF ENGINEERING EDUCATION RESEARCH, NASHIK

24-01-2015: Resource Persons Addressing to Participants from various 26-12-2014: Mr. Prashant, Saurabh, Varad , Shruti and Chaitali during Colleges during the FDP on “Research Methodologies and preparation of Demo Session on IT Security at CAN Expo 2014 research proposals” (REGION-VI) (REGION-VII) S. N. J. B’S KBJ COLLEGE OF ENGINEERING, CHANDWAD, NASHIK VELAMMAL ENGINEERING COLLEGE, CHENNAI

01-10-2015: Prof. M M Rathore, Prof. M R Sanghavi, SBC, Staff 23-12-2014; Dr. B Rajalakshmi, Dean-IT and CSI-SBC, Mr. Vanlin Sathya, Coordinators for the Inauguration of the Swaachata Abhiyaan by CSI Research scholar, Indian Institute of Technology, Hyderabad, Dr. B Student Members Venkatalakshmi, Chief co-ordinator-TIFAC CORE during “Recent trends in mobile communication” seminar (REGION-VII) (REGION-VII) SA ENGINEERING COLLEGE, AVADI SCAD COLLEGE OF ENGINEERING AND TECHNOLOGY, CHERANMADEVI

17-12-14: Dr. S. Suyambazhahan-Principal, Dr. G.Umarani Srikanth HOD- 18-09-2014: International Workshop On Sixth Sense Technology by CSE, Prof. V Vaidehi -, MIT & VP Dr. T.Sasilatha during the one week FDP Mr. Lohit Malik, Ms. Norma Marcia, Speech Therapist, UK is present on “Recent Trends in Wireless Sensor Networks” along with Prof. S Balaji, HOD, Dr. P Venkumar, Principal

CSI ED EVENT BOSS MOOL WORKSHOP AT COIMBATORE CONDUCTED BY CSI ED & KPR INSTITUTE OF TECHNOLOGY KPR Institute of Technology, Coimbatore joined with CSI ED, IITM, CDAC hosted the BOSS MOOL workshop for the benefi t of academicians at Coimbatore during 21st and 22nd January, 2015. This is the third BOSS MOOL Workshop conducted by CSI followed at Chennai, Ananthapur. There are extensive opportunities for the students to have their academic project work in this area and teaching faculties are trained to train the students.

21-01-15 : Prof. Janakiraman, IIT Madras inaugurating the BOSS MOOL Workshop . Prof. Nadarajan, Div II chair with Mr. Rajan Joseph, Director CSI ED looking on.

Please send your student branch news to Education Director at [email protected]. News sent to any other email id will not be considered. Please send only 1 photo per event, not more.

CSI Communications | February 2015 | 47 Bipin V Mehta CSI Calendar Vice President, CSI & Chairman, Conf. Committee 2015 Email: [email protected]

Date Event Details & Organizers Contact Information

February 2015 events

19-22 Feb 2015 Second International Conference on Inter-disciplinary Research in Engineering Prof. V P Saxena Conference Management, Pharmacy and Science (ICIREMPS) Chair [email protected] http://www.rajeshkshukla.com Dr. Surendra K. Jain Conference Co-Chair [email protected] Prof. Rajesh Shukla Convener Computer Science,Information Technology & Computer Application rkumardmh@ gmail.com

20 Feb 2015 First National Conference on Computational Technologies-2015 Prof. Ardhendu Mandal (NCCT’15) organised by CSI, Siliguri Chapter, Dept of Computer [email protected] Science and Application, University of North Bengal and CSI Div-V. http://www.nbucsaevents.in

23-24 Feb 2015 5th International Engineering Project Competition & Exhibition at the Vel Tech P Chandra Kumar University Campus in Avadi, Chennai. Organised by Vel Tech University and supported [email protected] by CSI & IEEE CS. http://veltechuniv.edu.in/VISAI2015/index.html

26 Feb-6 Mar Annual Symposium on Information Technology Research, Innovation and [email protected] 2015 Entrepreneurship Development award (ITRIED) [email protected]

March 2015 events

11–13 Mar 2015 9th INDIACom; 2015 2nd International Conference on “Computing for Sustainable Prof. M N Hoda Global Development” Organized by Bharati Vidyapeeth’s Institute of Computer [email protected], Applications and Management (BVICAM), New Delhi [email protected]

12-13 Mar 2015 International Symposium in honour of Dr Ravi Ravindran at Bangalore. Jointly Dr. M Mathirajan organised by ORSI, IIMM, IIITB, CSI and RIMSR. http://www.ravisymposium.org (+919945668905) or Mr. Ganesh Kumar (+919739011141)

27-28 Mar 2015 International Conference on ICT in Healthcare organized by Sri Aurobindo Institute Dr. Durgesh Kumar Mishra of Technology, Indore in association with CSI Indore, Udaipur Chapter and CSI [email protected] Division III and Division IV Communication. Prof. AK Nayak http://www.csi-udaipur.org/icthc-2015/ [email protected] Prof. Amit Joshi [email protected]

April 2015 events

3 -4 Apr 2015 National Conference on Creativity and Innovations in Technology Development Amit Joshi (NCCITD’15) at Udaipur. Organised by CSI Udaipur Chapter, Division IV, ACM [email protected] Udaipur Chapter and S S College of Engineering , Udaipur. www.csi-udaipur.org Dr. Jaydeep Ameta [email protected]

CSI Communications | February 2015 | 48 www.csi-india.org 11-12 Apr 2015 Two Day National Conference on ICT Applications “CONICTA-2014” at IIBM Prof. A K Nayak Auditorium, Patna, organized by CSI Patna Chapter in association with Div-III [email protected] and Div- IV of Computer Society of India Prof. Durgesh Kumar Mishra [email protected]

24-25 Apr 2015 ICON’15 “All India Conference On “Sustainable product in Computer Science & Prashant Richhariya Engineering organized by Chhatrapati Shivaji Institute of association with CSI prashantrichhariya@ Division IV, CSI Region IV. csitdurg.in

May 2015 events

15–17 May 2015 International Conference on Emerging Trend in Network and Computer Prof. Dharm Singh Communication (ETNCC2015) at Department of Computer Science, School [email protected] of Computing and Informatics Polytechnic of Namibia in Association with Computer Society of India Division IV and SIG-WC http://etncc2015.org/

Sept 2015 events

10-12 Sep 2015 International Conference on Computer Communication and Control (IC42015) at Dr. Pramod S Nair Medicaps Group of Institutions, Indore in association with CSI Division IV, mitm.csedepartment@ Indore Chapter and IEEE MP Subsection. yahoo.com Prof. Pankaj Dashore [email protected]

Oct 2015 events

9 – 10 Oct 2015 International Congress on Information and Communication Technology Dr. Y C Bhatt (ICICT-2014). At Udaipur. Organised by CSI Udaipur Chapter, Div-IV, SIG-WNs, [email protected] SIG- e-Agriculture and ACM Udaipur Chapter www.csi-udaipur.org/icict-2014 Amit Joshi [email protected]

16-17 Oct 2015 6th Edition of the International Conference on Transforming Healthcare with IT Mr. Suresh Kotchatill, to be held at Hotel Lalit Ashok, Bangalore, India. http://transformhealth-it.org/ Conference Coordinator, [email protected]

CSI Communications | February 2015 | 49 Kind Attention: Prospective Contributors of CSI Communications

Please note that Cover Theme for forthcoming issue of March 2015 is planned as follows: • March 2015 – Machine Translation Articles may be submitted in the categories such as: Cover Story, Research Front, Technical Trends and Article. Please send your contributions before 20th February 2015. The articles may be long (2500-3000 words maximum) or short (1000-1500 words) and authored in as original text. Plagiarism is strictly prohibited. Please note that CSI Communications is a magazine for membership at large and not a research journal for publishing full-fl edged research papers. Therefore, we expect articles written at the level of general audience of varied member categories. Equations and mathematical expressions within articles are not recommended and, if absolutely necessary, should be minimum. Include a brief biography of four to six lines for each author with high resolution author picture. Please send your articles in MS-Word and/or PDF format to the CSI Communications Editorial Board via email id [email protected]. (Issued on behalf of Editorial Board of CSI Communications)

CSI Communications | February 2015 | 50 www.csi-india.org Registered with Registrar of News Papers for India - RNI 31668/78 If undelivered return to : Regd. No. MCN/222/20l5-2017 Samruddhi Venture Park, Unit No.3, Posting Date: 10 & 11 every month. Posted at Patrika Channel Mumbai-I 4th fl oor, MIDC, Marol, Andheri (E). Mumbai-400 093 Date of Publication: 10 & 11 every month

Computer Society of India (CSI), India’s longest serving premier society of Information Technology and Computer Science professionals, has been rendering yeomen service to IT Education, Research and Industry. As you are aware, computers and communication technologies have become pervasive and their usage in our daily life continues to increase in several areas including education, entertainment, banking, travel, hospitality, healthcare and commerce. Our country is well known for providing IT solutions to the entire world. Indian IT industry earns over $120 billion per year representing about 6% of our GDP and employs over 3.5 million people in the areas of IT and IT- enabled services. By 2020, the earnings are expected to be about $300 billion along with increasing employment in all sectors. This tremendous growth, of course, demands continuous learning and updating ones knowledge in computing, IT, Communication and related areas. CSI has been playing a key role in fostering this growth and in harnessing ICT (Information and Communication Technology) for improving nation’s socioeconomic status and quality of life through its various activities - awareness creation, improving digital literacy, providing updates on advances in ICT, training and educational programs, conferences and seminars. The primary focus for CSI, now in its Golden Jubilee (50th) year has been serving the needs and interest of IT professionals, academics, college students, and the IT industry. Consistent with realizing the enhanced and ambitious vision of “IT for Masses”, CSI has launched an initiative that extends its services to schools through Institutional Membership (IM) to schools. Some schools have already become IMs and enjoying the benefi ts. This Institutional Membership scheme is aimed at helping schools in computer education and use. As can be seen from the brochure at http://goo.gl/aXYd2S the Institutional Membership provides signifi cant, long lasting benefi ts of value to the school - its management, teachers and students. Becoming an Institutional Member is easy. The website at http://goo.gl/zEQTUk provides the details on how a school can become an Institutional Member. We look forward to having schools as Institutional Members, joining us in the exciting journey of taking ICT in India to the next levels. We request our members to promote the IM in CSI among the schools in their area / in which their or their friends or contacts children are studying. Student members, may please promote the IM in CSI among the schools in which their or their friends brothers & sisters are studying. If the schools have any queries or need assistance to become an IM, they may please contact: Mr. Y. Kathiresan, Senior Manager (Promotions), Computer Society of India, Education Directorate, C.I.T. Campus, IV Cross, Taramani, Chennai - 600113. Phone: 044 - 2254 1102 / 1103; Mobile: 09444896312; email: [email protected]

CSI Communications | February 2015 | 51 CSI SUMMER INTERNSHIP FOR STUDENT VOLUNTEERS

Computer Society of India announces CSI Summer Internship for CSI Student volunteers. The scheme will be implemented in 2015 during the months of April, May and June. The internship programme envisages engaging the CSI Student Volunteers in an industrial environment, giving them a chance to glance at the work practices, development, deployment etc.

Calling Student Volunteers to make use of this opportunity !

For all details and application forms Please visit http://www.csi-india.org/summer-internship-volunteers .

CSI Communications | February 2015 | 52 www.csi-india.org