Keiser University-Tallahassee Classifieds>Keiser University-Tallahassee Online Courses>Quantum Computer Systems Design III: Working with Noisy Systems

Quantum Computer Systems Design III: Working with Noisy Systems

About this Course

This quantum computing course explores the basic design principles of today's quantum computer systems. In this course, students will learn to work with the IBM Qiskit software tools to write simple programs in Python and execute them on cloud-accessible quantum hardware. Topics covered in this course include: Introduction to systems research in quantum computing Fundamental rules in quantum computing, Bloch Sphere, Feynman Path Sum Sequential and parallel execution of quantum gates, EPR pair, no-cloning theorem, quantum teleportation Medium-size algorithms for NISQ (near-term intermediate scale quantum) computers Quantum processor microarchitecture: classical and quantum control Quantum program compilation and qubit memory management Keywords: quantum computing, computer science, linear algebra, compiler, circuit optimization, python, qiskit, quantum algorithms, quantum technology, superposition, entanglement, qubit technology, superconducting qubit, transmon qubit, ion-trap qubit, photonic qubit, real quantum computers

Created by: University of Chicago

Level: Advanced


Related Online Courses

In this course, you will examine the various areas of network security including intrusion detection, evidence collection and defense against cyber attacks. The issues and facilities available to... more
Well-designed and automated data pipelines and ETL processes are the foundation of a successful Business Intelligence platform. Defining your data workflows, pipelines and processes early in the... more
Embedded systems are everywhere – and Arm-based technologies are the industry standard. Getting started could not be easier. This course includes free access to an Mbed simulator so you can apply y... more
In this course, we build upon the knowledge we built up on cache side-channel attacks and transient-execution attacks, as well as the side-channel and security mindset. We again go beyond... more
In this course you will learn how to design relational databases and model those designs for others to understand. All forms of Normal Form will be covered so your database designs conform to best... more

CONTINUE SEARCH

FOLLOW COLLEGE PARENT CENTRAL