Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Quantum Computing’s Strength and Weakness

Author : Kuldeep Singh Kaswan 1

Date of Publication :20th December 2017

Abstract: Computers have developed especially from last 50 years. The current computers are extremely little, quick, amazing and vitality effective. In any case, this development has a farthest point. Presently researchers are taking a shot at a totally new sort of computer dependent on the Quantum material science rules. These computers are called quantum computers. The Quantum computers can take care of numerous issues which are not reasonable by the present traditional computer systems. The huge scale generation of the Quantum computers will begin soon, which will absolutely change the computers and this, will influence each field. To give gigantic taking care of capacities to current standard computer has delivered the possibility of quantum figuring. Quantum registering is a completely unique technique for building computer using quantum mechanics. By applying laws of quantum mechanics for computation has exponentially speeded up the dealing with capacities over old style material science. Quantum processing is another course of action of equipment for computer analysts, researchers, programming designers to make and overhaul figuring capacities far better than that can do with conventional registering.

Reference :

    1. E. Gull, A. J. Millis, A. I. Lichtenstein, A. N. Rubtsov, M. Troyer, and P. Werner, “Continuous-time Monte Carlo methods for quantum impurity models,” Rev. Mod. Phys., 2011, doi: 10.1103/RevModPhys.83.349.
    2. J. T. Barreiro, “Atoms, ions and photons for quantum tasks: Strengths and weaknesses,” 2014, doi: 10.1364/cleo_qels.2014.ftu3a.1.
    3. M. Shiddiq, D. Komijani, Y. Duan, A. GaitaAriño, E. Coronado, and S. Hill, “Enhancing coherence in molecular spin qubits via atomic clock transitions,” Nature, 2016, doi: 10.1038/nature16984.
    4. M. Alizadeh, S. Abolfazli, M. Zamani, S. Baaaharun, and K. Sakurai, “Authentication in mobile cloud computing: A survey,” Journal of Network and Computer Applications. 2016, doi: 10.1016/j.jnca.2015.10.005.
    5. V. Chang, D. Bacigalupo, G. Wills, and D. De Roure, “A categorisation of cloud computing business models,” 2010, doi: 10.1109/CCGRID.2010.132.
    6. L. Badger, R. Patt-corner, and J. Voas, “Cloud Computing Synopsis and Recommendations Recommendations of the National Institute of Standards and Technology,” Nist Spec. Publ., 2012, doi: 2012.
    7. B. J. Erickson, P. Korfiatis, Z. Akkus, and T. L. Kline, “Machine learning for medical imaging,” Radiographics, 2017, doi: 10.1148/rg.2017160130.
    8. M. H. Kuo, A. Kushniruk, and E. Borycki, “Can cloud computing benefit health services?-A SWOT analysis,” 2011, doi: 10.3233/978-1-60750-806-9-379.
    9. S. Mandrà, Z. Zhu, W. Wang, A. PerdomoOrtiz, and H. G. Katzgraber, “Strengths and weaknesses of weak-strong cluster problems: A detailed overview of state-of-the-art classical heuristics versus quantum approaches,” Phys. Rev. A, 2016, doi: 10.1103/PhysRevA.94.022337.

Recent Article