Quantum Computer Systems Design II: Principles of Quantum Architecture
About this Course
This quantum computing course explores the basic design principles of today's quantum computer systems. In this course, students will learn to work with the IBM Qiskit software tools to write simple programs in Python and execute them on cloud-accessible quantum hardware. Topics covered in this course include: Introduction to systems research in quantum computing Fundamental rules in quantum computing, Bloch Sphere, Feynman Path Sum Sequential and parallel execution of quantum gates, EPR pair, no-cloning theorem, quantum teleportation Medium-size algorithms for NISQ (near-term intermediate scale quantum) computers Quantum processor microarchitecture: classical and quantum control Quantum program compilation and qubit memory management Keywords: quantum computing, computer science, linear algebra, compiler, circuit optimization, python, qiskit, quantum algorithms, quantum technology, superposition, entanglement, qubit technology, superconducting qubit, transmon qubit, ion-trap qubit, photonic qubit, real quantum computersCreated by: University of Chicago
Level: Advanced
Related Online Courses
In this course, part of the Algorithms and Data Structures MicroMasters program, you will learn how graph algorithms are used in two fundamental problems in modern biology: How do we sequence a... more
Le cours est structure en six chapitres. Le premier est dedié aux concepts de base en informatique et en robotique. Le deuxieme chapitre permet d'avoir une introduction au robot Thymio. Les ... more
Using motivational videos, introductory sections, an interactive code editor, challenges and peer review throughout this course you will develop a working chat app. While doing so you can earn... more
To prepare you for this course, we recommend completing the free 3-hour introductory MOOC Re-Imagine Work - Strategies During COVID-19 and Beyond. In this course, you will gain a foundational... more
With today's increasing challenges of dealing with more aggressive and persistent threat actors, while also being inundated with information that is full of misinformation and false flags across... more